Small-scale cyber security: mapping security requirements for IT users at home and in small organisations

<p>Despite a long-standing assumption that developments in personal and cloud computing models would change the way we approach security, small-scale IT users (SSITUs) remain underserviced by existent cyber security models. This dissertation discusses survey results relating to the technology...

Full description

Bibliographic Details
Main Author: Osborn, E
Other Authors: Simpson, A
Format: Thesis
Published: 2018
Subjects:
_version_ 1797081794797895680
author Osborn, E
author2 Simpson, A
author_facet Simpson, A
Osborn, E
author_sort Osborn, E
collection OXFORD
description <p>Despite a long-standing assumption that developments in personal and cloud computing models would change the way we approach security, small-scale IT users (SSITUs) remain underserviced by existent cyber security models. This dissertation discusses survey results relating to the technology employed by SSITUs and their engagement with cyber security.</p> <p>We determine that: SSITUs are focusing on easy-to-implement technical measures, leading to a disconnect between the security implemented and any risks identified; few SSITUs face more than basic threats or employ more than basic security measures; available resources, knowledge, prioritisation of business processes, reduced system control and a lack of threat intelligence all combine to limit the ability to make cyber security decisions; and assessing risk in SSITUs will not lead to sufficient investment to mitigate risks for risk-holding stakeholders in the supply chain.</p> <p>We also found that: the system architectures employed by SSITUs are significantly different to those employed by large corporate or government entities; the architecture of a small organisation’s digital footprint has far more impact on their overall security than would be the case for a large organisation; and SSITUs do not hold sufficient influence within the supply chain to manage cyber security in their interactions with service providers.</p> <p>We show that improving small-scale cyber security architectures is not simply about developing new technology — there is a need to consider technology use in context of interactions within a broader ecosystem of a supply chain, users with multiple roles and conflicts of interest, as well as the increased importance of SSITUs’ digital footprints on their security.</p> <p>In order to improve the cyber security posture of the smallest organisations, security providers need a better understanding of their requirements and the role of larger stakeholders within the supply chain. They also need a business case for investing in products for this marketplace. To this end we have developed a framework of global requirements and constraints for small-scale cyber security, which should have the potential to assist in the development of products adapted for this user group.</p> <p>For contrast we have provided a requirements framework developed from the perspective of the risk-holding stakeholders in the supply chain, to illustrate the differing expectations of the best-resourced stakeholders in their interactions with SSITUs. This highlights the difficulties posed by incumbent best practices, where many security measures are beyond the grasp of SSITUs and the risks some stakeholders expect to be reduced far exceed the means of the smaller organisations.</p> <p>We conclude that, with a better understanding of the context within which SSITUs operate, combined with a suitable expectation of how much risk can be transferred to them within the supply chain, it is possible to improve small-scale cyber security.</p>
first_indexed 2024-03-07T01:19:03Z
format Thesis
id oxford-uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24
institution University of Oxford
last_indexed 2024-03-07T01:19:03Z
publishDate 2018
record_format dspace
spelling oxford-uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b242022-03-26T23:06:22ZSmall-scale cyber security: mapping security requirements for IT users at home and in small organisationsThesishttp://purl.org/coar/resource_type/c_db06uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24Computer securityORA Deposit2018Osborn, ESimpson, A<p>Despite a long-standing assumption that developments in personal and cloud computing models would change the way we approach security, small-scale IT users (SSITUs) remain underserviced by existent cyber security models. This dissertation discusses survey results relating to the technology employed by SSITUs and their engagement with cyber security.</p> <p>We determine that: SSITUs are focusing on easy-to-implement technical measures, leading to a disconnect between the security implemented and any risks identified; few SSITUs face more than basic threats or employ more than basic security measures; available resources, knowledge, prioritisation of business processes, reduced system control and a lack of threat intelligence all combine to limit the ability to make cyber security decisions; and assessing risk in SSITUs will not lead to sufficient investment to mitigate risks for risk-holding stakeholders in the supply chain.</p> <p>We also found that: the system architectures employed by SSITUs are significantly different to those employed by large corporate or government entities; the architecture of a small organisation’s digital footprint has far more impact on their overall security than would be the case for a large organisation; and SSITUs do not hold sufficient influence within the supply chain to manage cyber security in their interactions with service providers.</p> <p>We show that improving small-scale cyber security architectures is not simply about developing new technology — there is a need to consider technology use in context of interactions within a broader ecosystem of a supply chain, users with multiple roles and conflicts of interest, as well as the increased importance of SSITUs’ digital footprints on their security.</p> <p>In order to improve the cyber security posture of the smallest organisations, security providers need a better understanding of their requirements and the role of larger stakeholders within the supply chain. They also need a business case for investing in products for this marketplace. To this end we have developed a framework of global requirements and constraints for small-scale cyber security, which should have the potential to assist in the development of products adapted for this user group.</p> <p>For contrast we have provided a requirements framework developed from the perspective of the risk-holding stakeholders in the supply chain, to illustrate the differing expectations of the best-resourced stakeholders in their interactions with SSITUs. This highlights the difficulties posed by incumbent best practices, where many security measures are beyond the grasp of SSITUs and the risks some stakeholders expect to be reduced far exceed the means of the smaller organisations.</p> <p>We conclude that, with a better understanding of the context within which SSITUs operate, combined with a suitable expectation of how much risk can be transferred to them within the supply chain, it is possible to improve small-scale cyber security.</p>
spellingShingle Computer security
Osborn, E
Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title_full Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title_fullStr Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title_full_unstemmed Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title_short Small-scale cyber security: mapping security requirements for IT users at home and in small organisations
title_sort small scale cyber security mapping security requirements for it users at home and in small organisations
topic Computer security
work_keys_str_mv AT osborne smallscalecybersecuritymappingsecurityrequirementsforitusersathomeandinsmallorganisations