Cyber Security Management Model A Proposal For Org
Cyber Security Management Model A Proposal For Org
Cyber Security Management Model A Proposal For Org
organizations
Assoc. prof. Ing. Josef Kubík, CSc
Faculty of Administration and Economic Studies in Uherské Hradiště, Města Mayen
1536, Uherské Hradiště 686 01, Czech Republic, e-mail: [email protected]
Abstract
1. Introduction
Authors react to mentioned ideas and propose a managerial model for cyber security
system that could be applied in organizations across economy. Their aim is not to provide
“one size fits all” solution, but to offer lean and functional cyber security management
model. This approach seems to be suitable for customization in various organizations.
The paper summarizes authors´ proposal and is structured as follows:
DOI: 10.60026/IJPAMED.V8I2.140
1
- The second chapter summarizes theoretical fundamentals of cyber security
issues, cyber world in general and issues related to cyber security management.
- The third section provides basic internal logics of authors´ work, fundamental
questions are formulated respectively.
- The fourth chapter introduces the cyber security management model proposal
itself. The model is visualized via several objects to be easily interpreted.
- The final chapter briefly summarizes and provide some conclusions.
2. Theoretical Basis
To define the term cyber security itself is many but not easy task. According to Fisher
(2016), cyber security consists of lots of parts, e. g. safety and privacy, using and sharing
information, control, security bodies, entities etc., but we do not have one universal
definition. Current studies conclude its multidimensional and strategic, processional
nature (Wirtz & Weyerer, 2007); inclusion of extend analytical activities, research and
development; managerial activities and functions; resources; wide information basis;
variability of stakeholders; as well as relationships and attitudes (Studýnka, 2019; Fisher,
2016; Wirtz & Weyerer, 2007).
Very important issue, thinking about cyber security, is management of cyber risks and
threats. Disturbance of cyber security very often affects safety, accountability, reliability,
economy or individual lives and society (Fisher, 2016; Mulligan & Schneider, 2011). And
this is the reason, why to effectively manage cyber security systems in organizations.
Effective cyber security management system ensures flexible and fast reactions to cyber
disturbances, minimalizes their impacts and mitigates risks. Management system is
affected by risks on one side and resources on the other (Wirtz & Weyerer, 2007).
Effective system should provide comprehensive analysis of risks and their severity or
probability; sufficient resources and tools; reactivity and recovery strategies; skilled
human resources; as well as support.
It is noteworthy and considerable that actual state of art in organizations, regarding cyber
security and its system, is dismal and lacking significantly behind the needs and threats
of current world and society (Pleta et al., 2020). Here, we come to the issue of cyber
attacks (disturbances respectively) and to important cyber security challenges.
Cyber attacks can be characterized as effort of unauthorized person to access ICT system,
usually aiming on fraud, theft, disturbance, damage or other illegal, respectively
DOI: 10.60026/IJPAMED.V8I2.140
2
undesirable, action (e. g. Mulligan & Schneider, 2011). The aim of cyber security is attacks
elimination, via application of effective and functional tools. Cyber attacks can be
classified respecting various viewpoints, e. g. purpose (explorative, attacks on access,
service denial attacks), legal classification (crime, espionage, terrorism, cyber war), level
of agent engagement (active, passive), extend of impacts (extensive severe attacks, attacks
with limited impacts), type of network (MANET, WSN) – see Uma & Padmavathi (2013)
for more comprehensive overview.
Business and managerial models are changing regarding increasing number of virtual
activities and operations (Andronache & Althonayan, 2019). This brings significant
benefits, but on the other hand also lots of threats - Andronache & Althonayan (2019)
mention term “development paradox”; and intensification of cyber attacks that are
sophisticated. Regarding this, cyber security management is required to ensure adequate
system protection, resiliency, integrated strategies and suitable operative models,
proactive safeguards, as well as periodical evaluation and prospective change (Ezingeard
et al., 2007; Limba et al., 2017). On the other hand, organizations and management are not
effective in these issues (see, e. g. Andronache & Althonayan, 2019; Ezingeard et al., 2007;
Tisdale, 2015 for this thesis), however management is usually aware of their importance;
sometimes this lead also to undesirable overreaction and over-engineering of solutions
(Ezingeard et al., 2007).
According to Tisdale (2015), arguments for complex and effective cyber security
management are obvious – overcoming fragmentation of cyber security systems,
reduction of costs of cyber incidents, operational trade-offs, vulnerabilities adaptation
and resistance, keeping up with changes in environment, technological development,
organizational success and survival.
DOI: 10.60026/IJPAMED.V8I2.140
3
Cyber security management can be perceived as:
- System, how to build effective cyber security processes for systems and
information protection (Ezingeard et al., 2007).
DOI: 10.60026/IJPAMED.V8I2.140
4
- Integrity of organizational and security Leadership enhancement and proactive approach
objectives to strategic and operational issues
- Existence of conceptual documents,
Reduction of values and goals discrepancies
methods, and legislation
- Formalization of processes and standards
Related to human resources: Cyber security is not managed in holistic way and
is lagging threats and current level of cyber crime
- Internal culture that is not cyber security
supportive Organization do not have sufficient control and
- Lack of awareness and competencies for risk management mechanisms
work in cyber environment
Management of organizations understand and
- Change resistance
support generally the idea about quality of
Related to strategy: security management and cyber security systems
- Costs of cyber security systems Lack of resources and skills
- Underinvestment into cyber security
Organizations are aware of priorities formulation,
infrastructure due to underestimation of
strategies formulation, evaluation of performance,
its significance and returns
education, and enlightenment
- “Silo” structures instead of complex
structures
- Lack of maturity and preparedness,
reactiveness
- Low prediction ability and understanding
to global complex environment
Source: based on Andronache & Althonayan (2019); Ezingeard et al. (2007); Chen et al.
(2015); Tisdale (2015); Niekerk van & Solms von (2010).
How to develop a cyber security management model? Seemingly a simple question, but in
fact it is far from reality. To handle this essential question, the methodology of authors´
DOI: 10.60026/IJPAMED.V8I2.140
5
approach is now to be introduced. At the beginning of whole process authors tried to react
to following issues:
What are the main needs of organizational cyber security; what are the main weak and
strong points? To answer this, the initial analysis of systems needs to be applied.
Does organization have sufficient hardware, software and economic sources? Potential
investments need to be considered.
How does organization manage its cyber security? Strategies, policies, and methods need
to be formalized and standardized. This is an issue of prevention.
How does organization manage the impacts of cyber attack? The process needs to be
formalized and standardized. This is an issue of minimizing negative impacts of successful
cyber attack.
Abovementioned issues were critically assessed by the authors, regarding either current
surveys (their main findings and opinions were introduced above in the second chapter
of the paper), or practical experience of authors and several other experts interviewed.
Such approach was found appropriate, especially due to variation in opinions and
attitudes of sources.
Based on introduced approach, authors target main purpose of this paper – how to
effectively and fluently develop and apply a model for cyber security management.
Proposed model is realized internally with minimum additional sources requirements.
Even though, it is perfectly competitive, lean and functional, closely connected with
overall structure of organization and its management system. Authors add also several
considerable remarks for organizations that outsource their ICT systems.
In this chapter, authors introduce the actual model proposal for cyber security
management – thus, here is embedded the core of this paper and the whole work. Firstly,
the model is visualized in figure 1.
In the first phase, a comprehensive analysis of current situation of cyber security and its
system should be developed. Based on organizational data and experience, the
organization gains wide range of information and will be ready to develop effective
managerial system for cyber security. A key point is to base the analysis on evidence-
based approach – IT department of the organization should mine all available data about
cyber security and ICT systems (among others revise access rights and rules, safety nets,
DOI: 10.60026/IJPAMED.V8I2.140
6
software equipment etc.) Suitable can be formulation of SWOT analysis that concludes all
the relevant information and is user friendly for experts as well as for laiks. Results should
be disseminated through whole organization if it is relevant from managerial viewpoint.
In the second phase, management should nominate members for cyber security executive
board (CSEB). This body will be responsible for effective and actual cyber security system
which is flexible and able to react to the needs of organization and internal or external
changes. It would be convenient to develop a periodic schedule of CSEB meetings. The
possible structure of the body is illustrated in figure 2. Key operational and expert role
should be dedicated to the manager of cyber security and to IT department. Managers and
employees from other departments should provide necessary and desirable cooperation
and keep themselves informed about actualities. Additionally, independent cyber auditor
and manager of data protection regulation (where applicable) should be nominated,
outsourcing is a relevant option.
In the third phase, required sources (economic, personal, technological and others) need
to be identified and ensured. Screening of needs and actual situation is a task especially
for IT employees; following assurance of necessary resources is a task for management,
CSEB respectively.
In the fourth phase, it is useful to support the whole cyber safety system by its
formalization and standardization. This could be done via formulation of cyber security
strategy and policy, as well as via formulation of process maps and understandable
internal legislation. Preparation and final results of these activities should be discussed
with employees and these should be kept informed about all relevant facts. Thus,
acceptation and adoption of good praxis will be higher, and engagement of all employees
will be better. In this phase of the process, all employees should already know their
competencies and responsibilities, which should be implemented into their everyday
work. This phase is the main part of strategic and operational management of cyber
security in organization. Let us stress once again at this point, communication and
acceptation are crucial for all cyber security activities and activities in ICT systems in
general. Important part of standardization and formalization of cyber security system
should be planning and realization of suitable education, enlightenment, and awareness
of individuals enhancement. Managerial support is the other cornerstone.
In the fifth phase, the system of reaction to cyber attack (or incident, more generally)
should be developed and formalized. Authors of this paper recommend formulate a
process map with essential steps, that could be more precisely described in internal
legislation, cyber security strategy and policy (see phase four). Simple structure of such
process map is introduced in figure 3.
One key characteristics of a model proposal lefts – periodicity and modifications. Like
many other models or systems, even the system of cyber security management should be
viable, flexible, and evolving. Regarding this, it should be standardized a periodicity of
phase one of the model (analysis) to ensure validity and topicality. According to
periodically identified and evaluated findings, modifications of phase three and four
should be realized. In case of phase five, this one is operative and crisis solving. Regarding
this, it should be flexible, accurate, as well as swift; the organization and all individuals
should learn from various crisis situations and try to be better in future.
DOI: 10.60026/IJPAMED.V8I2.140
7
Figure 1: Cyber security management system development
How Audit of cyber systems, processes and roles – data and process analysis
Result Report with clear and sufficient information about strong, weak points,
threats and opportunities
Personal department
Who CSEB
IT employees
Who CSEB
DOI: 10.60026/IJPAMED.V8I2.140
8
Formulation and standardization of objectives and activities
Result Formal system and processes are developed and agreed across
organization
Who CSEB
IT employees
Source: Authors.
On the other hand, chair of CSEB should coordinate activities of CSEB with all other
activities within organization, link management structure with CSEB, provide resources,
make most important strategic decisions and solve prospective conflicts. Executive
manager of organization could be one of suitable candidates for this position.
Relatively specific and more ad hoc character have cyber auditor and manager of data
protection regulation. Cyber auditor should be, without any doubt, independent person –
if not, proper picture of cyber security situation in organization could not be provided.
Independence of cyber auditor can be ensured via creation of a specific job position
DOI: 10.60026/IJPAMED.V8I2.140
9
outside the system of organizational departments, sufficient financial reward at the
position; could be strengthened via outsourcing of the auditing service.
Manager of data protection regulation can be constituted or not (in lots of organizations,
there is no such need identified). Management of data protection is, on the other hand,
very important issue, when organizations administrate wide range of sensitive data, as
well its important role play also legislative requirements. Thus, it could be advised to keep
establishment of this function in mind, it is also possible to outsource the service.
Chair of CSEB
(possibly executive
manager)
Particular
IT department
departments
Source: Authors.
Every step of the process of cyber attack (incident) management has its importance and
it is not advised to miss or omit some of them. Immediate notification about attack or even
suspicion is crucial for effective solution of crisis and elimination of negative impacts.
Every person in organization should be aware of this fact and know to whom give
information. IT specialists and manager of cyber security are mainly responsible for
situation analysis, operative actions and arrangements or prospective reduction of cyber
services and activities realization. After primer appropriate arrangements and actions,
the CSEB should discuss the situation, consider objectives, future steps and
recommendations proposed by manager of cyber security. Accordingly, decisions should
be made, and recovery plan should be agreed. Very important part of the process is
realization of suitable actions and adjustments of ICT systems; evaluation of crisis; as well
as conclusions formulation and learning from failings; prospectively sanction personal
failures. In case that cyber attack (incident) is relevant for external subjects (e. g.
distortion of clients or supplier´s data; reduction of cyber services provided etc.), it is
advised to inform such stakeholders about situation and its solutions.
DOI: 10.60026/IJPAMED.V8I2.140
10
Figure 3: Process of cyber incident management
Source: Authors.
Finally, authors would like to mention one more issue – outsourcing of the whole ICT
system of the organization. Many, especially small or medium-sized organizations do not
administrate their ICT systems on their own. They prefer turn-key solutions based on
complete outsourcing that is cheaper and more comfortable for them (they do not need
IT department, perform savings in personnel, software and hardware equipment etc.).
Similar approach prefer e. g. organizations in public sector (see, e. g. Studýnka, 2019 for
further discussion) – they need sophisticated systems for administrations of wide range
of important data, system compatibility, realization of specific services and activities etc.
In house solutions are for them costly and require highly skilled experts.
DOI: 10.60026/IJPAMED.V8I2.140
11
Proposed cyber security management model is however suitable even for organizations
with outsourced ICT systems. Chair of CSEB and manager of cyber security have to be
perfectly familiar with supplier conditions and safeguards system; manager of cyber
security have to be perfectly familiar with technical solutions of ICT systems; chair of
CSEB should strictly require security guaranties in supplier contracts. Open and intensive
communication between organization and ICT supplier is crucial.
5. Conclusion
The paper introduces several issues related to cyber security and its management in
organizations of current world. At the first section of the paper, context of cyber security
and cyber attacks (or incidents to be more general) was summarized, followed by ideas
regarding management of cyber security. The next section briefly introduced
methodology of cyber security model proposal and its internal logics. In the most
important section, the model proposal was described and supplemented by several
commentaries of authors.
It is noteworthy to mention, that it does not exist one universal solution for development
and application of cyber security management models. Every organization should
customize the system to its needs and possibilities, as well as to current external
DOI: 10.60026/IJPAMED.V8I2.140
12
environment. Most importantly – every organization should be aware of its cyber security
and apply relevant objectives.
Authors´ aim was not to force organizations into any universal model fit, but to provide
some useful ideas for management of cyber security, that they consider to be crucial in
current world. Proposed model pointed at several systematic issues not to be overlooked.
Nevertheless, there could be limitations identified, related e. g. to model´s applicability in
various organizational environments, specified details of partial phases, roles of CSEB
members and their number etc. This is an issue for future work. On the other hand,
simplicity and general guideline character of proposed model should be evaluated as
beneficial, providing wide adjustments possibilities. Such nature of proposed model is its
strong and competitive point. Hopefully, in this manner will be the paper and model
proposal perceived by readers.
DOI: 10.60026/IJPAMED.V8I2.140
13
References
• Limba, T. et al. (2017). Cyber security management model for critical infrastructure.
The International Journal Entrepreneurship and Sustainability Issues, 4(4), 559-583.
• Niekerk van, J. F., Solms von, R. (2010). Information security culture: A management
perspective. Computers & Security, 29, 476-486.
• Uma, M., Padmavathi, G. (2013). A survey on various cyber attacks and their
classification. International Journal of Network Security, 15(5), 390-396.
• Wirtz, B. W., Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public
sector: How public administration copes with digital threats. International Journal of
Public Administration, 40(13), 1085-1100.