Structuring The Chaos Enabling Small Business Cyb
Structuring The Chaos Enabling Small Business Cyb
Abstract
Small businesses are increasingly adopting IT, and consequently becoming more
vulnerable to cyber-incidents. Whilst small businesses are aware of the
cyber-security risks, many struggle with implementing mitigations. Some of
these can be traced to fundamental differences in the characteristics of small
business versus large enterprises where modern cyber-security solutions are
widely deployed.
Small business specific cyber-security tools are needed. Currently available
cyber-security tools and standards assume technical expertise and time
resources often not practical for small businesses. Cyber-security competes
with other roles that small business owners take on, e.g. cleaning, sales etc.
A small business model, salient and implementable at-scale, with simplified
non-specialist terminologies and presentation is needed to encourage sustained
participation of all stakeholders, not just technical ones.
We propose a new UML class (Small IT Data (SITD)) model to support the often
chaotic information-gathering phase of a small business' first foray into
cyber-security. The SITD model is designed in the UML format to help small
business implement technical solutions. The SITD model structure stays relevant
by using generic classes and structures that evolve with technology and
environmental changes. The SITD model keeps security decisions proportionate to
the business by highlighting relationships between business strategy tasks and
IT infrastructure.
We construct a set of design principles to address small business
cyber-security needs. Model components are designed in response to these needs.
The uses of the SITD model are then demonstrated and design principles
validated by examining a case study of a real small business operational and IT
information. The SITD model's ability to illustrate breach information is also
demonstrated using the NotPetya incident.
one’s action can undermine the motivation to engage [25]. According to the
EAST principle [42] of human behavioural insights, making something easy also
helps encourage the desired behaviour. Improving the overall ease of access for
non-technical stakeholders can improve the outcome of a cyber-security solution
by facilitating effective and ongoing participation.
To enable small business engagement with any new cyber-security tool, it
is essential to redesign the current highly technical mental structure of cyber-
security analysis. A cyber-security system with infinite flexibility has proven
to be an issue for small business adoption (as mentioned above), so any new
approach has to address this gap by tailoring to small business operational and
humancharacteristics. Toachievethis, are-definingofthefundamentalbuilding
blocksofhowcyber-securityispresentedtosmallbusinessisneeded. Technology
and cyber-risk-centric language, common in existing security frameworks, need
to give way to concepts familiar to non-technical business owners. The proposed
data model needs to center on business concepts and terms that an average
person with no technical training can understand.
Building on the above, to support a business-friendly cyber-security process,
we propose a new class model (referred to as SITDmodel) to help a small busi-
ness organise and record its priorities and its IT. For a small business operator,
a model needs to document IT details as these are often not at the forefront of
their mind [41], with many relying on informal communication [46]. The initial
cyber-security step of recording the IT being used can require significant effort
from small businesses. The SITDmodel eases the cognitive load by beginning
with information in areas of familiarity, e.g. day-to-day tasks, before tying it
back to cyber-security.
3 Target Users and Businesses of SITD Model
At a technical level, the SITDmodel serves as the data foundation for future
small business cyber-security analysis tools and processes. There are 2 primary
target stakeholders for the SITDmodel: the small businesses to be protected,
and the cyber-professionals implementing cyber-security tools to be used by the
small business.
3.1 Target Modelled Businesses
TheSITDmodel is designed to model small businesses with 0 -19 employees [4],
in order to protect them. (Sole traders/single person companies are considered
to have 0 employees.) One exclusion to this broad scope is small businesses
that offer IT-centric services and products, as they are likely to have additional
security considerations (e.g. DevSecOps [27]) and technical skills.
4
Figure 1: UML class structure diagram showing the connections between dif-
ferent parts of the business. (Described in section 6.2.)
6.3SITD Submodel: Job Function
TheJob Function part of the SITDmodel describes the links between job tasks
and the roles performing the tasks (Figure 2).
The job tasks described as part of business goals are linked to the human
responsible for the task. The task is performed in the context of the person’s
job role. The SITDmodel allows for more than one person to work on the same
task using a collaboration link in the context of different roles (e.g. business
plans being completed in collaboration between the owner and accountant).
Conversely, multiple physical people can work on the same job task via the same
function roles (e.g. multiple sales assistants in a retail shop). This model allows
for the same physical person to take on multiple job functions, as is common in
micro-enterprises where the owner can also be the security, janitor and website
administrator. In early analysis, the function role can be synonymous with a
physical person; role information can be added after further analysis. This is
particularly useful in sole trader/micro-companies where roles are not formally
assigned or defined.
The job function model links job tasks to the data item(s) needed to per-
10
Figure 2: The UML class structure diagram showing how job functions lead
to people working together and hence needing access to specific data within the
business. (Details in section 6.3.)
form the tasks. Every business task requires some sort of data item to be used,
whether it is the product price in a sales transaction, a recipe within a manu-
facturing plant, or lesson plans within an education setting. Data is considered
at a more fundamental level than just the electronic storage of the information.
6.4SITD Submodel: IT Interaction
We now link data to the IT systems used to store and use this data (Figure 3).
TheSITDmodelonlyincludesanydatastoredelectronically. Itisassumedthat
any physical data stored is handled according to the existing risk management
plan and outside the scope of cyber-security. Inspite of the SITDmodel’s elec-
tronic focus, ISO27001 [45] includes physical access as part of risk management.
Hence, any system implementing the SITDmodel needs to include reminders
that physical security is still required.
The data item must be stored within a destination (target) system. This
is intended to be a generic container that records details of where the data
is stored. The target system can range from a local drive on a laptop/phone
to cloud services or records held by another business/entity. The details of
the service and location are captured in the classes associated with the data.
We recognise that data (class Alternate Access) can be retrieved by another
party off the same system, e.g. business registration details can be requested
by a member of the public using the registration body website. The target
system classes are deliberately light on technical detail to reflect the reality
that most small businesses have limited influence on the technical details of
the electronic data storage. For example, hosted websites only allow limited
customisation from a look and feel perspective, webmail providers dictate the
login process and whether multi-factor authentication mechanisms are offered,
retail hardware/software manufacturers decide whether memory is encrypted by
11
Figure 3: UML class structure diagram showing how a person accesses specific
data in target systems using their devices and network connection. (Discussed
in section 6.4.)
default etc.
On a physical front, the SITDmodel links the access to the data via a physi-
cal location and device, and ultimately to a physical person. The link highlights
that physical access to this device-connection pipeline plays an important part
in the security posture. For example, if someone has physical access to a Wi-Fi
router, then no matter how secure the target system, the risk of a man in the
middle attack increases.
At a physical device level, the classes are simplified from a technical view-
point e.g. the OSI 7 layer model [19], to capture only applications, operating
system (OS) and network connector classes - components the business worker
interacts with. This is to ensure focus on the components under the worker’s
control on a day to day basis. An application is any software program that
the business uses on a physical device, ranging from productivity suites such
as Microsoft Office to browsers for access to cloud services/web pages. While
the simplification does make technical vulnerability analysis more difficult, most
vulnerability notifications, common vulnerabilities & exploits, vendor notifica-
tions today relate impacts to applications and/or operating systems [52].
In its current version, the SITDmodel does not consider system to system
IT events e.g. batch jobs, scheduled events. The SITDmodel’s target audi-
ence are non-technical small businesses; the utilisation of automated events is
minimal [5].
6.5SITD Submodel: Threats
Finally, to illustrate deviations in risk between different industries and busi-
nesses, a threat model is included in the SITDmodel to describe any specific
or general threat to the business. This section again focuses on human threat
12
actors rather than the technical threat. Removing human motivation eliminates
many reasons for exploiting a vulnerable system. This human threat actor class
can describe single actors e.g. an industry competitor, or groups e.g. Advanced
Persistent Threat (APT)/nation state actors.
Figure 4: UML class structure diagram showing how certain threat motiva-
tions can mean specific data (and IT system by association) can require more
attention. (Discussed in section 6.5.)
The majority of small businesses, before having a cyber-incident, do not
perceive cyber incidents as likely [8]. The threat model is important to docu-
ment motivations, especially in specialised industries (e.g. defence contractors,
fiercely competitive market conditions etc.). The threat model highlights any
part of the business that may require a higher level of priority, to help assess
adequate level of investment.
6.6 Overall SITD Model
Each subpart of the SITDmodel described in sections 6.2 - 6.5 can be used
independently. However, when linked together with common classes, the model
creates a picture of the interrelations between IT and business goals (Figure 5).
Based on the linked business goal, the business can prioritise the parts of IT
needing attention from a cyber-security perspective.
Fromananalyticsperspective, therelationshipsshowhowunconnectedparts
of the business can lead to an asset needing protection from motivated actors.
A class and relationship model highlights gaps without impeding progress.
Partial data is of use to trigger investigation and further discussions.
13
Figure5: UMLclassoverviewshowingtherelationshipsbetweenvariousfactors
within a (sample) small businesses’ overall cyber-security posture, discussed in
section 6.6.
7SITD Model Applications
We will now demonstrate the use of the SITDmodel by modelling a case study
business. Business operation modelling of cyber-security relevant concerns is
done using source data from a non-cyber-security small business case study [37]
1to emulate a small business owner’s point of view. Technical modelling is
sourced from a UK small scale IT architecture case study [35] , including small
business participants. Finally, we utilise a NotPetya breach analysis to illustrate
theSITDmodel use in incident analysis.
1As the business is currently operating, all identifying information of the small business,
individuals, specific products and locations are redacted in the public version of this article
to protect their privacy, including citations. Original information and citations were provided
for review purposes.
14
Figure 6: Agriculture small business case study result as depicted by the SITD
model. The reclassified items, Product Competition Organiser and Email Host,
are unshaded. Areas of possible investigation and discussion are marked with
added symbols. Discussion in section 7.1.2.
as anti-virus and backups, needs to happen to ensure availability of their
devices and systems. Owner 1 may need additional training to prevent
phishing [56].
2.Orphaned Components - There are location (Home), person (Owner 2)
and data (Tax Data) items (marked with a triangle ▲in Figure 6) noted
in the business, but the information in the case study does not indicate
relationships between these and other components.
3.Tasks with No Details - There are several tasks: Harvest Sale, Gen-
eral Marketing and Product Design, identified (marked with a star ★in
Figure 6), noted in the case study in general, but with no information
given regarding the tools/devices needed to perform them. Most tasks
need information, so further exploration is required on whether there are
dependencies on IT.
The lack of information by itself is not treated as a point of concern within
theSITDmodel process. It is an expected by-product of the focus of small busi-
ness owners, viz to keep business activities running. The purpose of this model
is to help obtain the relevant details needed from a cyber-security perspective.
16
The left side of the diagram in Figure 8 clearly links the key reasons for the
business to protect crop management data with the core task of crop manage-
ment. This relationship information keeps forefront the business value protected
byanypotentialsecuritycontrol. Adiscussiontoprotectcropmanagementdata
is needed as it enables the business to maintain a high-quality brand (by timing
the harvest) and supports production. The context helps stakeholders assign
the right level of resources and importance.
7.1.4 Change in Operating Environment
We now demonstrate the SITDmodel’s ability to handle external changes to
a small business, with the example of legislative change in the introduction
of Australian Goods and Service Tax (GST). GST is a percentage tax that
merchants collect on consumer sales [12]. The collected tax is then passed on to
thegovernmentinBusinessActivityStatements(BAS)returnstotheAustralian
Taxation Office (ATO). Initially, most international sellers were exempt from
collectionduetothelowvalueofindividualorders(suchasprocessedagriculture
products in the case study). Subsequently international merchants who achieves
a substantial amount of low value sales to Australian customers [12] were also
included. The GST collection requirement applies to our case study business.
To comply with the GST rule using guidance from ATO [12], the SITD
model will be expanded with the following class instances which were not in the
case study:
•ABN: Data Item (Australian Business Number)
•Australian GST Collected: Data Item
•Lodge Tax/BAS Return: Job Task
•Pay GST: Job Task
•Customs Information: Data Item
•Customer Invoice: Data Item
•ATO: Destination System
In addition, the following existing instances are modified:
•Sell Processed Product: Job Task – Link to additional instances to comply
with GST requirements.
•Production & Sale: Engineering Characteristics – Link to the need to
lodge additional tax (BAS) returns to the ATO, and the payment of the
GST collected using data collected during sales process .
The resulting SITDmodel due to external GST change is illustrated in
the Figure 9, with the added instances highlighted in yellow. Note that the
18
case study and breach incident were used to show the SITDmodel recording
security-relevant business, and technical and incident details. Due to the socio-
technical nature of cyber-security [40], all 3 types of details support the analysis
of a business’ cyber-security posture.
Table 2 shows, in detail, how the SITDmodel design and usage examples
demonstrate the fulfilment of design principles set out in Sections 3 and 4.
Design Principles Met
NeedsSection(s) of This Article
9 Conclusion
We proposed the SITDUML data model as a way to gather and organise small
business cyber-security information. Big standards, whilst flexible, lead to big
knowledge requirements and resource commitments, making them difficult to
adopt for resource-scarce small businesses. The SITDmodel helps alleviate
some barriers faced by small businesses in understanding cyber-security focused
security processes and utilising tools currently available. The SITDmodel
proposes a new way of working towards a small business cyber-security posture.
TheSITDmodel’s analysis of case studies of a micro agricultural busi-
ness, UK micro-businesses’ architecture and NotPetya breach incident shows
the capability of the SITDmodel in capturing and organising security-relevant
information. The SITDmodel highlights the value of cyber-security decisions
by linking the decisions to the business’ operational activities, via SITDlinks
between objects. The examples provided above demonstrated the ability of the
SITDmodel to model businesses in varied environments, giving structure to an
often qualitative, open-ended cyber-security process.
TheSITDmodel’s UML foundation gives a ready channel and a structured
way for any prospective solution developers (technical or otherwise) to ensure
relevant information is captured and organised. Furthermore, UML can readily
be accommodated by technologies that allow databases, thus minimising imple-
mentation issues and effort.
TheSITDmodel does not seek to replace existing cyber-security standards,
but rather fill the existing gaps with respect to small business needs. It is a
streamlined way of organising the often informal and piecemeal nature of busi-
ness information relevant to a cyber-security posture, facilitating the analysis
process. Rather than starting from a technological or risk management per-
spective, the SITDmodel leads discussion from business-centric perspectives.
Structurally, the SITDmodel provides a pathway to connect the business in-
formation to IT information.
Ultimately, the SITDmodel serves as a pathway towards a more inclusive
small business cyber-security process, by taking into account the needs of both
cyber-security solution developers and small businesses.
Acknowledgments
This research is supported by an Australian Government Research Training
Program (RTP) Scholarship. This project was conducted under an Approval
from the RMIT Human Ethics Committee (Approval Number: 23928). Au-
thors’ Note: The business case study, in section 7.1, citations and identifying
information in text and figures have been anonymised to protect the privacy of
the small business in publication.
26
References
[1] Ande, R., Adebisi, B., Hammoudeh, M., Saleem, J.: Inter-
net of Things: Evolution and Technologies from a Security Per-
spective. Sustain. Cities Soc. 54(February 2019), 101728 (2020).
https://doi.org/10.1016/j.scs.2019.101728
[2] Angeli, C., Valanides, N.: Examining the Effects of Text-Only and
Text-and-Visual Instructional Materials on the Achievement of Field-
Dependent and Field-Independent Learners During Problem-Solving with
Modeling Software. Educ. Technol. Res. Dev. 52(4), 23–36 (2004).
https://doi.org/10.1007/BF02504715
[3] Ashton, G.: Maersk, me & notPetya (Jun 2020), https://gvnshtn .com/
maersk-me-notpetya/, accessed: 01/12/2021
[4] Australian Bureau of Statistics: 1321.0 - Small Business in Australia, 2001
(2001), https://www .abs .gov .au/ausstats/abs@ .nsf/mf/1321 .0
[5] AustralianBureauofStatistics: 8167SelectedCharacteristicsofAustralian
Business (2019), https://www .abs .gov .au/statistics/industry/technology-
and-innovation/characteristics-australian-business/2017-18
[6] Australian Bureau of Statistics: 8165.0 - Counts of Australian
Businesses, Including Entries and Exits, June 2015 to June 2019
(2020), https://www .abs .gov .au/AUSSTATS/abs@ .nsf/DetailsPage/
8165 .0June2015toJune2019?OpenDocument
[7] Australian Bureau of Statistics: Australian Industry by Divi-
sion, Australian Industry, Financial Year 2019-20 (May 2021),
https://www .abs .gov .au/statistics/industry/industry-overview/
australian-industry/2019-20/81550DO001_201920 .xls
[8] Australian Cyber Security Centre, Australian Signals Di-
rectorate: Cyber Security and Australian Small Businesses
(2020), https://www .cyber .gov .au/sites/default/files/2020-07/
ACSCSmallBusinessSurveyReport .pdf
[9] Australian Cyber Security Centre, Australian Signals Directorate:
Essential Eight Maturity Model (2021), https://www .cyber .gov .au/
sites/default/files/2021-10/PROTECT-EssentialEightMaturityModel%
28October2021%29 .pdf
[10] AustralianSmallBusinessandFamilyEnterpriseOmbudsman: SmallBusi-
ness Counts (2020), https://www .asbfeo .gov .au/sites/default/files/2021-
11/ASBFEOSmallBusinessCountsDec2020v2_0 .pdf
[11] AustralianSmallBusinessandFamilyEnterpriseOmbudsman: SmallBusi-
ness Matters (2023), https://www .asbfeo .gov .au/sites/default/files/2023-
10/SmallBusinessMatters_June2023 .pdf
27
[36] Park, J., Campbell, J.M.: U.S. Small Business’s Philanthropic Con-
tribution to Local Community: Stakeholder Salience and Social Iden-
tity Perspectives. J. Nonprofit Public Sect. Mark. 30(3), 317–342 (2018).
https://doi.org/10.1080/10495142.2018.1452823
[37] Redacted: Redacted. Redacted
[38] Redacted: Redacted, Redacted
[39] Renaud, K.: How Smaller Businesses Struggle With Security Advice. Com-
puter Fraud and Security 8, 10–18 (2016). https://doi.org/10.1016/S1361-
3723(16)30062-8
[40] Schneier, B.: The Importance of Security Engineering. IEEE Security and
Privacy10(5), 88 (2012). https://doi.org/10.1109/MSP.2012.132
[41] Scott, M., Bruce, R.: Five Stages of Growth in Small Business. Long Range
Plann.20(3), 45–52 (1987). https://doi.org/10.1016/0024-6301(87)90071-9
[42] Service, O., Hallsworth, M., Halpern, D., Algate, F., Gallagher, R.,
Nguyen, S., Ruda, S., Sanders, M., Pelenur, M., Gyani, A., Harper, H.,
Reinhard, J., Kirkman, E.: EAST Four Simple Ways to Apply Behavioural
Insights (2014), https://www .bi.team/wp-content/uploads/2015/07/BIT-
Publication-EAST_FA_WEB .pdf, accessed:10/12/2021
[43] Small Business Digital Taskforce: Small Business Digital Taskforce, Re-
port to Government (2018), https://treasury .gov .au/sites/default/files/
2021-07/p2018-191027-sbdt-report .pdf
[44] Sood, K., Hurley, S.: NotPetya Technical Analysis (2017),
https://www .crowdstrike .com/blog/petrwrap-ransomware-technical-
analysis-triple-threat-file-encryption-mft-encryption-credential-theft/
[45] Standards Australia Limited: AS ISO/IEC 27001 Australian
Standard Information Technology - Security Techniques - Infor-
mation Security Management Systems - Requirements (2015),
https://infostore .saiglobal .com/en-au/Standards/AS-ISO-IEC-27001-
2015-111199_SAIG_AS_AS_232620/
[46] Street, C.T., Meister, D.B.: Small Business Growth and Internal Trans-
parency: TheRoleofInformationSystems.MISQ.Manag.Inf.Syst. 28(3),
473–506 (2004). https://doi.org/10.2307/25148647
[47] Sullivan-Taylor, B., Branicki, L.: Creating Resilient SMEs: Why One
Size Might Not Fit All. Int. J. Prod. Res. 49(18), 5565–5579 (2011).
https://doi.org/10.1080/00207543.2011.563837
[48] Tam, T., Rao, A., Hall, J.: The Invisible COVID-19 Small Business Risks:
Dealing with the Cyber-Security Aftermath. Digit. Gov. Res. Pract. 2(2)
(2020). https://doi.org/10.1145/3436807
30
[49] Tam, T., Rao, A., Hall, J.: The Good, the Bad and the
Missing: A Narrative Review of Cyber-Security Implications for
Australian Small Businesses. Comput. Secur. 109, 102385 (2021).
https://doi.org/10.1016/j.cose.2021.102385
[50] Tan, T., Maynard, S., Ahmad, A., Ruighaver, T.: Information Secu-
rity Governance: A Case Study of the Strategic Context of Informa-
tion Security. In: Pacific Asia Converence Inf. Syst. vol. 43. Association
for Information Systems Electronic Library (AISeL), Langkawi (2017),
http://aisel .aisnet .org/pacis2017/43
[51] The Mitre Corporation: Mitre Att&ck (2019), https://attack .mitre .org/,
accessed: 01/03/2021
[52] The Mitre Corporation: CVE (2023), https://cve .mitre .org/, accessed:
14/11/2023
[53] United Nations Office on Drugs and Crime: Comprehensive Study on
Cybercrime (2013), http://www .unodc .org/documents/organized-crime/
UNODC_CCPCJ_EG .4_2013/CYBERCRIME_STUDY_210213 .pdf
[54] Von Solms, R., Van Niekerk, J.: From Information Secu-
rity to Cyber Security. Comput. Secur. 38, 97–102 (2013).
https://doi.org/10.1016/j.cose.2013.04.004
[55] Watson, C., Zaw, T., Andriushchenko, I., Justiniano, G.M., Tesauro,
M.: OWASP Automated Threat Handbook Web Applications. OWASP,
Bel Air, United States (2018), https://owasp .org/www-pdf-archive/
Automated-threat-handbook .pdf
[56] Williams, E.J., Hinds, J., Joinson, A.N.: Exploring Susceptibility to Phish-
ing in the Workplace. Int. J. Hum. Comput. Stud. 120(June 2017), 1–13
(2018). https://doi.org/10.1016/j.ijhcs.2018.06.004
[57] WizCase Cyber Research Team: Over 80 US Municipalities’ Sensitive In-
formation, Including Resident’s Personal Data, Left Vulnerable in Mas-
sive Data Breach (2021), https://www .wizcase .com/blog/us-municipality-
breach-report/, accessed: 13/01/2021
[58] World Economic Forum: Securing a Common Future in Cy-
berspace (2018), https://www .youtube .com/watch?v=Tqe3K3D7TnI, ac-
cessed: 05/01/2022
Appendix - Reading the Model: UML Conven-
tions
Our model is highly reliant on UML. Here is an example to show how to inter-
prete UML class and object diagrams.
31