-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathform-structure.php
More file actions
149 lines (149 loc) · 8.81 KB
/
form-structure.php
File metadata and controls
149 lines (149 loc) · 8.81 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
<?php
global $securedam_internal_policy_form_sections;
$securedam_internal_policy_form_sections = array (
array (
"slug" => "privacy-and-data-security",
"title" => "Privacy and Data Security",
"description" => "Include this topic for information about data handling and protection, data privacy, collecting data online, storage and security and lost or stolen data.",
"question" => "Does your business handle or store sensitive data or data that includes personal information about your employees or your customers?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "privacy-and-data-security.html",
"cross-selling" => "privacy-and-data-security.html"
),
array (
"slug" => "scams-and-fraud",
"title" => "Scams and Fraud",
"description" => "Include this topic for information about phishing, social engineering, online fraud, identity theft, malicious software, telephone scams and more.",
"question" => "All businesses can be susceptible to scams and fraud. Therefore, we recommend this topic be part of any basic cyber security plan. Do you wish to include this section?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "scams-and-fraud.html",
"cross-selling" => "scams-and-fraud.html"
),
array (
"slug" => "network-security",
"title" => "Network Security",
"description" => "Include this topic for information about computer networks, password policies, secure wireless connections, encryption, remote access, Internet access and more.",
"question" => "Does your business have an internal network – a group of computers connected together – and/or a Wireless Local Area Network (e.g, a WiFi router)?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "network-security.html",
"cross-selling" => "network-security.html"
),
array (
"slug" => "website-security",
"title" => "Website Security",
"description" => "Include this topic for information about securing a public website, including server security, login and transaction encryption, Web applications, links and redirects.",
"question" => "Does your small business have a public website?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "website-security.html",
"cross-selling" => "website-security.html"
),
array (
"slug" => "email",
"title" => "Email",
"description" => "Include this topic for information about filtering, employee training, email retention and management, and creating email policies.",
"question" => "Do you use either a business email account or personal email account to conduct business or interact with customers and/or employees?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "email.html",
"cross-selling" => "email.html"
),
array (
"slug" => "mobile-devices",
"title" => "Mobile Devices",
"description" => "Include this topic for information about mobile security practices, threats and emergency preparedness planning for small businesses and their employees.",
"question" => "Does your business use any Internet-connected mobile technology, such as smartphones, laptops and tablets?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "mobile-devices.html",
"cross-selling" => "mobile-devices.html"
),
array (
"slug" => "employees",
"title" => "Employees",
"description" => "Include this topic for information about hiring, background checks, partner companies, access controls and security training.",
"question" => "Does your business have more than one employee?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "employees.html",
"cross-selling" => "employees.html"
),
array (
"slug" => "facility-security",
"title" => "Facility Security",
"description" => "Include this topic for information about your companyas physical security, including protection pf printed material, mail security and disposal of trash and electronic equipment.",
"question" => "Does your small business have physical assets that need to be protected, including printed material and electronic equipment?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "facility-security.html",
"cross-selling" => "facility-security.html"
),
array (
"slug" => "operational-security",
"title" => "Operational Security",
"description" => "Include this topic for information about developing a plan to secure information and networks critical to business operations.",
"question" => "Does your small business store data that would be valuable to cyber criminals, such as proprietary information valuable to your company's operations or sensitive customer data, such as personally identifiable information?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "operational-security.html",
"cross-selling" => "operational-security.html"
),
array (
"slug" => "payment-card",
"title" => "Payment Cards",
"description" => "Include this topic for information about electronic transactions, secure services, access to payment systems, protecting and storing customer data and more.",
"question" => "Does your business accept credit card payments or other electronic payments?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "payment-cards.html",
"cross-selling" => "payment-cards.html"
),
array (
"slug" => "incident-response-and-reporting",
"title" => "Incident Response and Reporting",
"description" => "Include this topic for information about phishing, social engineering, online fraud, identity theft, malicious software, telephone scams and more.",
"question" => "All businesses should include an understanding of how to respond to a cyber attack as part of any basic cyber security plan, and thus we recommend you include this section. Do you wish to include?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "incident-response-and-reporting.html",
"cross-selling" => "incident-response-and-reporting.html"
),
array (
"slug" => "policy-development-management",
"title" => "Policy Development, Management",
"description" => "Include this topic for information about developing security policies, roles and responsibilities, employee behavior and protecting your company’s reputation.",
"question" => "All business with employees can benefit from having written security policies and procedures. Do you wish to include this section?",
"answers" => array (
"yes" => "Yes, add please this section to my guide",
"no" => "No, remove this section to my guide"
),
"policy" => "policy-development-management.html",
"cross-selling" => "policy-development-management.html"
)
);
?>