wpostServer: http://css.washingtonpost.com/wpost2

Cybersecurity May 17 to 20, 2012

Poll Questions

Q: (Among internet users) When you set up passwords online, do you always use the same password, or do you happen to use different passwords?

Q: (Among those who use different passwords) Do you ever use the same password for different websites, such as banking, social networking and shopping?

Q: (Among internet users) In general, do you use online passwords that are (easy for you to remember) or ones that are (complex and would be hard for someone to guess)?

Q: (Among internet users) Overall, how confident are you that you can keep things like computer viruses, spyware and adware off of your home computer when you want to?

Q: (Among internet users) How much do you ever worry that your email will be read by someone besides the person you sent it to?

Q: (Among internet users) How much do you ever worry that someone might know what Web sites you’ve visited?

Q: (Among internet users) How much do you ever worry that you’ll get a computer virus when you download information?

Q: (Among internet users) How much do you ever worry that someone will access your bank or credit card account?

Q: (Among internet users) Do you ever access the Internet wirelessly using ‘Wi-Fi’ on a laptop, tablet or smartphone?

Q: (Among Wi-Fi users) How often do you use public wireless ‘hotspots’ – very often, sometimes, rarely or never?

Q: (Among all WiFi users) When you use public wireless networks, do you take special security precautions, or not?

Q: (Among Wi-Fi users who take precautions) In your own words, what kind of precautions do you take?

Q: (Among internet users) How often, if ever, do you post personal information about yourself on Facebook or other social media sites?

Q: (Among internet users) How often, if ever, do you post your travel plans on Facebook or other social media sites?

Q: (Among internet users) How often, if ever, do you post detailed information about your friends on Facebook or other social media sites?

Q: How concerned are you that computer systems of the U.S. government could be the target of a major cyber-attack, meaning that computer systems could be shut down or damaged by viruses or other hacker attacks? (Half sample)

Q: How concerned are you that computer systems of U.S. business could be the target of a major cyber-attack, meaning that the computer systems could be shut down or damaged by viruses or other hacker attacks? (Half sample)

Q: (Among those very/fairly concerned about a cyber attack) What is the country or organization that you’re most concerned about launching such an attack?

Q: What do you think is more important, for the federal government (to investigate possible threats of cyber attack even if that intrudes on personal privacy) or (not to intrude even if that limits its ability to investigate threats of cyber attack?)

Q: In your opinion what is the likelihood that the U.S. government will be subject to a major cyber-attack in the next 12 months?(Half sample)

Q: In your opinion what is the likelihood that U.S. businesses will be subject to a major cyber-attack in the next 12 months?(Half sample)

Q: And, how prepared do you think the U.S. government is for a major cyber-attack?(Half sample)

Q: And, how prepared do you think U.S. businesses are for a major cyber-attack? (Half sample)

Q: When it comes to computer network security standards at US companies should the govt require specific standards by law, encourage but not require such standards or stay out of it entirely?

Q: Congress is considering legislation to make it easier for the government and U.S. companies to exchange information about potential cyber-security threats. Some of the information could include personal Internet content and e-mails.Do you think the new information exchange (is justified to try to prevent cyber-attack), or do you think it (goes too far in invading personal privacy)?

Q: (Among those who say goes too far) What if there were protections against the release of names and other identifying information – in that case do you think the information exchange would be justified, or not?

Q: Combined result -- information exchange including privacy protections

Most Read: Politics

Read In

Now Viewing: People from around the country looking at Post Politics section

See what's being read across the country ›

Social Surface: Politics