SME Security Problem Statement
SME Security Problem Statement
SME Security Problem Statement
remember and might be relevant given the MDs attitude to security and the
need for ROI.
Learning Outcomes
The specific learning outcomes will depend on how the scenario is used. The
following are suggested technical learning outcomes.
On completion of the scenario, students will be able to:
1
Articulate the major security risks and legal compliance issues for an
SME.
Analyse and discuss the relevance of Cyber Essentials and BMIS to the
scenario.
Identify and justify technical controls for securing remote access and data
governance.
Analyse the scenario above, identify aspects of it that you do not understand
and need to research before moving forward. Then create and deliver a
presentation which discusses the following.
1. What do you see as the major security issues here?
2. An outline plan of action to improve the security of this
company.
3. What further information do you need from the company in
order to propose a way forward?
Your Task Stage 2: Proposal and Plan
Reflection on Learning
It is also important that at the end of the scenario you should reflect on your
learning and team working and identify what worked well, what didnt and
actions for future improvement.
Understanding
organizational history
and context
Scenario analysis
Socio-technical organizational
analysis.
Clarification of ambiguities
b
c
Facilitator Guidance.
Determining the
problem to be
resolved
a
b
c
Identifying/ learning
necessary knowledge
Identifying
alternative solutions
Choosing optimal
solution
Planning the
implementation
Implementation
Final evaluation
b
c
d
a
b
Resources
Brecht, M & Nowey, RT. (2012) A Closer Look at Information Security Costs,
http://weis2012.econinfosec.org/papers/Brecht_WEIS2012.pdf [Last
accessed 29-May-2015]
This paper is useful for discussing ROSI. It identifies and describes the
problems and difficulties in quantifying an enterprise's cost for
information security in a comprehensive way. The paper discusses
four approaches to categorise and determine information security
costs in an enterprise. Not as good as Sonnerich (see below) in my
opinion, but useful.
Posthumus, S., & Von Solms, R. (2004). A framework for the governance of
information security. Computers & Security, 23(8), pp. 638-646. [Online].
Available from:
http://www.sciencedirect.com/science/article/pii/S0167404804002639
[Accessed on 22/11/2015]
Von Solms, R., Thomson, K. L., & Maninjwa, M. (2011). Information security
governance control through comprehensive policy architectures. In
Information Security South Africa (ISSA), (pp. 1-6). IEEE. [Online]. Available
from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6027522,
[Accessed on 11/03/2015]
Working With
Others:
Participate
7
constructively in
team by Taking
responsibility,
Showing
sensitivity and
provide
Eviden
ce
Sound Pass (50- Very Good Pass
Pass (40-49%)
(grade
59%)
(60-69%)
d on)
Almost all
threats and
Most
risks identified
appropriate
correctly and in
threats,
suitable format,
vulnerabilities and prioritised
and reasoned
appropriately.
risk levels
Addresses all
assigned.
major risks, with
Appropriate risk appropriate
treatment
controls. Links
measures for
are made
major risks.
between
Security culture risks/threats
and solutions,
and standards
including culture.
discussed
briefly.
Most risks
Team
Report
Some risks
relating to legal
regulations
explicitly
identified.
Some
indicators of
Return on
Investment
identified
Reports are
structured
with appropriate
headings.
Acceptable
spelling and
grammar.
Mostly
relevant
content.
relating to legal
regulations
explicitly
identified.
Clear links to
ISO27k, BMIS
and Cyber
Essentials.
Key points of
ROSI explicitly
discussed
Alternatives are
discussed, but
may be briefly.
Report structured
with appropriate
headings.
Generally
appropriate
level of detail,
but inconsistent
As sound pass
Present As pass and
and
ation is presentation
presentation
consist emphasises
clearly links
ent
key points and features/ benefits
with,
has balanced
of solution with
report. content.
client needs and
problems.
Usually
communicates
quickly with
Timeke
others if
eping,
problems
oral
attending or
contrib
meeting
utions,
commitments,
VLE
On time for
posting
most meetings,
s,
Completes most
timelin
Considered
reliable by team
mates.
Almost always
communicates
quickly with others
& renegotiates if
problems
attending or
Consistent
treatment of
assets/threats/ris
ks, correct id & in
suitable format.
Excellent (70100%)
Comprehensive
list of threats,
risks, and impact
clearly related and
in suitable format,
evaluated and
prioritised
appropriately.
Report is detailed,
addresses all
As sound pass
major risks,
and clearly linked appropriate
to most
controls, including
requirements.
culture, clearly
Benefits of
linked to most
solution
requirements and
identified.
critical
Systematic and evaluation of
alternate
complete
treatment of legal solutions
provided.
regulations.
Systematic and
ISO27k, BMIS
complete
and Cyber
treatment of legal
Essentials.
regulations.
integrated into
the report
Convincing
discussion of
ROSI.
Wei
ght
70
%
ISO27k, BMIS
and Cyber
Essentials.
integrated into
the report
Alternatives are
Convincing
discussed
highlighting key discussion of
ROSI.
issues.
Alternatives are
Written in clear
discussed
consistent and
critically
appropriate
(business) style of highlighting key
issues
English.
complete/consist
Technical detail
ent solution.
explained
Clear, concise and
appropriately.
complete with
appropriate level
of detail
throughout
almost all report.
Presentation is
persuasive,
balanced,
thorough and
clearly links
features/benefit
s of solution to
client
needs/problems
As Sound pass
and on time for
almost all
meetings,
Completes all
Presentation is
consistent with,
and relates to
report.
20
%