Visible to the public Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes

TitlePragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes
Publication TypeConference Paper
Year of Publication2016
AuthorsParkin, Simon, Fielder, Andrew, Ashby, Alex
Conference NameProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4571-2
Keywordscps privacy, cyber essentials, data privacy, Human Behavior, Metrics, pubcrawl, Resiliency, security effort, SME security
Abstract

Here we model the indirect costs of deploying security controls in small-to-medium enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and collective capacity to operate controls efficiently, resulting in inadvertent data leakage and exposure to compromise. Aside from financial costs, attempts to maintain security can impact morale, system performance, and retraining requirements, which are modelled here. Managing the overall complexity and effectiveness of an SME's security controls has the potential to reduce unintended leakage. The UK Cyber Essentials Scheme informs basic control definitions, and Available Responsibility Budget (ARB) is modelled to understand how controls can be prioritised for both security and usability. Human factors of security and practical experience of security management for SMEs inform the modelling of deployment challenges across a set of SME archetypes differing in size, complexity, and use of IT. Simple combinations of controls are matched to archetypes, balancing capabilities to protect data assets with the effort demands placed upon employees. Experiments indicate that two-factor authentication can be readily adopted by many SMEs and their employees to protect core assets, followed by correct access privileges and anti-malware software. Service and technology providers emerge as playing an important role in improving access to usable security controls for SMEs.

URLhttp://doi.acm.org/10.1145/2995959.2995967
DOI10.1145/2995959.2995967
Citation Keyparkin_pragmatic_2016