History has
witnessed the endeavors of people to make the world a better and comfortable
place to live. There are various people that have been making efforts to bring
this world closer, and this dream has almost come true with the help of internet
technology’s advent. Internet, since its reality, has rapidly grown and still,
it is growing substantially. Moreover, it is the internet that has paved the
new and latest ways for businesses to attract target audience from all around
the world and look beyond the existing business range (Lopes &
Oliveira, 2014).
Both small and medium enterprises (SMEs), as well as large enterprises, have been
making a considerable amount of investment in technology and making best use of
the internet to enhance their profitability and getting the attention of the
worldwide customers. However, the real utopia does not exist in this world; with
the help of internet’s revolutionary effects over businesses, the risk and
threats also exist to the information security of the organizations (Sadok
& Bednar, 2016).
In addition, as
the organizations have opted to employ the platform based on the internet so
that they could reach the world, a very big amount of organizational
information is being created in the digital format. “Plethora of interconnected
networks” is an information system by which the digital information of
organization travels across the world, this information system is prone to
several kinds of cyber-attacks such as spams, viruses, malware, phishing, and Trojan's
kinds of cyber terrorism. In the economically competitive business scenario of the
present day, information is one of the most valuable and precious assets for
businesses and if organizations fail to protect it then they may suffer huge
blows to their repute and financials (turn off, 2013). This is one of the
cons of the internet that has made organization suffer from loss of valuable
information; this is why the businesses need to update their information security
with the latest technology (Sanchez, Villafranca & Piattini, 2007). This
paper aims to analyze the need for information security management for SMEs in
a brief while discussing key relevant issues and problems associated with information
security management implementation in SMEs.
Need for Information
Security Management in SMEs
The SMEs need to
implement information security management in order to encounter the security
challenges within the organizations. SMEs need to keep on changing the business
techniques with the passage of time while meeting information security measures
requirements. It has now become essential for the SMEs to be a pawn in
worldwide technology. The SMEs security policies should be developed in a way
that it could adapt to change in the technology and align it with updating
organizational objectives (KOURIK, 2011). In order to make it
sure that business is sustainably driving ahead with accurate security
policies, the infrastructure transformation of security should be placed
according to the strategic business objectives of the enterprise. Barb wired facilities,
safes in banks, security guards, and locked houses, etc. aim to provide physical
security to organizational assets. On the other hand, the information security
management system is analogous to each security measure while being responsible
to provide data security in the company’s digital domain (Disterer, 2013). There
are following four major objectives of information security management system
in SMEs:
Confidentiality:
information should be transferred to respective people on the need to know
basis and make it sure that information does not reach to some unauthorized
person.
Integrity:
information
that is saved in the systems of the organization must be kept guarded against contaminated
or being corrupted.
Availability:
making
it sure that data is available to authorized people at the right time. Both availability
and confidentiality ensure the integrity of data.
Non-repudiation:
ability to prove as well as ensures the integrity and authenticity of data.
The
organization, in order to have a successful and sustainable business, needs to
analyse and assess the information security management of the organization, make
a sound and implementable approach in dealing with the issues regarding information
security, link the objectives of their business with evolving information
security needs and address the information security importance and the plan
implementation. The aim of SMEs that highly rely on the information technology
infrastructure is challenging the large enterprises owing to their customized
solutions as well as efficiency and flexibility (Inscnetnetworks,
2016).
All of the kind of business stakeholders require assurance of information
security management system in the case it cause any kind of damage (SANGANI & VIJAYAKUMAR, 2012). An SME would
outshine its competitors by having a well-defined and sound information
security plan and strategies, and policies while being an obvious choice for
its targeted customers. This is why information security helps SMEs yielding in
customer satisfaction as well as having a secure and better structure of IT that
will ultimately help an organization with a good repute and attract more
business (Barlette & Fomin 2008).
In addition, it
is necessary to embrace information security in order to realize it in the working
scenario of the day-to-day. The connection between information security and goals
of enterprise is crucial and it is necessary for the SMEs to be aligned the organization’s
security policies along with evolving business needs. Tough decisions,
apparently, need to be made for effective information security in terms of
financial impacts. Network security concerns that SMEs face is the same as
faced by large enterprises. Larger enterprises that have greater finances can
opt out of so many products for authentication while SMEs that have limited personnel,
as well as finances, have to use Microsoft password kind of security protocols to
cope with their challenges. Authorized users can get access through an
effective and efficient biometric security device only through eye pupil or scanning
their fingerprints. The biometric security device system removes the needs of entering
user passwords each time an authorize and the authenticated person wants to get
access to necessary information, enhancing productivity and providing convenience
to the users (Valdevit, Mayer & Barafort, 2009).
With the rapid
growth of the expanding corporate ecosystem and networks of the virtualized
business, the information is converted and created to the digital format. The
various storage devices are used to storing the digitalized information. It can
be easily transferred over the plethora of interconnected network for bot
condition as externally and internally. Due to the rapid increase of the
business activities on internal crime and security threats for the information
are becoming common places. For the business world, the new challenges brought
up due to the internet (Harris & Patten, 2014).
There are
various kinds of threats that are faced by the SMEs and all of these threats
are related to information security. These threats include as the business
competitors, hackers and even it can a foreign government that can easily
employ a host of the various methods for obtaining the information from any
organization. There is no effective business that can isolate by using the
digitalized information for preventing from the various incidents. The success and competitiveness of the
company are linked with these organization as well as the damage to the
branding of the organization. It is also linked with the right information that
is delivered within the deadline. The lack of security in the information can
be the cause of the biggest damage to the brand of the organization (Cohen, 2014).
The cost refers
to the significant element of the information security and the personal
experiences are always needed along with the implementation, designing, and
development of the effective security system. It has been required a major
investment that must be invested for maintaining, building, and trustworthy,
responsive and reliable security system (Chen, Han, Cao, Jiang, & Chen, 2013).
Get
smarter as a hacker, to project the network devices as well as the digital
assets the need is even greater. The IT security can be expensive, and the cost
of the organization far more is the significant breach.The health of the Small
business can be jeopardized by the large breaches. A
team of the IT security after or during incidents could follow the plan
of the incident response as the tool of management risk to obtain the situation
control. Most of the SMEs are facing the conditions of the tight budgeting
along with the extremely limited manpower as several different needs for supply
of resources in the limited form. The priorities list can be down by placing
the information security list (Abbas, 2015).
While
information security does refer to
various kinds of security.Information
security discusses the process as well as the design
of tools for the protection of the sensitive business information to the invasion, as the IT security permits the
securing of the digital data, by the network security of a computer. With the confidentiality and
safeguarding the information security is the charged with integrity as well as the availability of the information
proceeds that is stored or transmitted by using the university electronic
resources by;
Provide
a comprehensive awareness as well as
training of the information security
The
Information Security is facilitating, by changing the management program
Related
to incidents the response of computer security as well as conducting the timely
investigations
To
counter the threats, taking proactive measure, vulnerabilities as well as
cyber-attacks. (Sadowsky & et.al, 2003)
Information
security can be used to promote security,
stability, as well as to threaten the same.
In a positive aspect, the information
security can be used to exchange the ideas along with the disseminate, and
security strategies to collect the support on
behalf of the security program plus peace of mission, coordinate
security plans as well as operations. The information security plays a major role such as to ban land mines in an
international campaign. The negative aspect is, the information security could
be attacked as well as exploited in ways,
which are threatening the security as
well as stability (Anas Tawileh, 2007).
Security
management enterprises permit a director to oversee a arrange comprising of
physical and virtual firewalls from one central area. Chairmen require
organizing security administration arrangements to get a tall level of
deceivability into arranging behavior,
mechanize gadget arrangement, implement worldwide arrangements, see
Cornwall activity, bind reports, and give a single administration interference
for physical and virtual frameworks. Arrange security administration make a
difference diminish manual errands and human blunders by disentangling
organization with security approach and workflow instruments through a
centralized administration interface (Bhaskar & et.al, 2013). Network security
administration can decrease hazard over the organize and secure information by
leveraging the data on dangers, arrange vulnerabilities and their criticality,
assessing potential alternatives to piece an assault, and giving insights for
choice. Organize security administration is developing more complex by the day.
Dangers to arrange security proceeds to advance. Compliance commands are giving
unused challenges while patterns toward portable network and Bring Your Possess
Gadgets to include more extra complexity. As systems got to be more advanced,
chairpersons are saddled with less deceivability but more prominent desires for
tackling issues rapidly. Unused innovation is continually being created to
offer assistance moving forward arrange security administration, but choosing
successful arrangements from an overabundance of organizing security items
takes the kind of time and skill few in-house IT groups (Sadowsky &
et.al, 2003).
Arrange security has gotten to be synonymous with complex arrange engineering,
authoritative bad dreams, and expanded risk introduction. Bunch security point organizations, assorted
administration supports, and complex and obsolete security arrangements spread
over numerous run the show bases make compelling arrange administration and
great permeability into arranging activity about the inconvenience. In the
modern era, computer systems are powerless to dangers from both interior and
outside the organization. As endeavor systems grow broadly and all-inclusive to
incorporate Web access, intranets, extranets and e-commerce exercises (Anas Tawileh, 2007).
Benefits of Information Security
for SMEs
The
information security checks the malicious threats as well as breaches of the
potential security, which can contain the huge impact of the organization.In the internal network of your
company when to enter, the information security helps to ensure the authorized
user that can access as well as create variations for sensitive information to
reside there. To ensure the confidentiality of
the organization data, the information security works. (Bhaskar &
et.al, 2013)
There
are the following benefits;
Protection
of sensitive information
Security
management
Security
testing
Network
Security (Inscnetnetworks, 2016)
There are many
of the issue and problems of the organizations are handled by the policies FOR
Cybersecurity, for example, one of the main problems that many of the small to
medium size of an organization have is the installation of malware because the
malware secretly installed itself in the computer of the organization. the
malware than start collecting data and files of the organization the malware
can be sent by the person or from any of the server that is under the control
of the attacker. After the data of the organization is stolen, it is then sold
to the black market or to the other that then use the data to harm the
company's business or for the other unethical use of the data (Hu, 2012). There are many of
the cases about this kind of attacks against the banks for the illegal
transaction of money. All of the devices of the user like the desktop, mobile,
table are most vulnerable to the Cyber-attacks. The small to medium size of an
enterprise should be the concern with the policies of the cybersecurity because
they are normally less likely to invest in the information security of the
company than the large organizations. To increase the cyber policies following
in the organization the company should reward those employees who follow the
policy and punish those who are not likely to follow any cybersecurity policies (Alexender, 2015).
Technology Trends and Development for information security in SMEs
From
the Cyber-attack, the growing attacks are
attributed to development and trends in the information technology. In the
Development as well as the technology trends its reviews the trend areas like
as below (Tipton, 2014 )
Ubiquity
Mobility
Hacking
tools
Groundedness
Vulnerabilities
Information
security
Performance
Information
security is becoming increasingly connected as well as pervasive. Information
security is spreading by the world in workplaces as well as home. The
connectivity, as well as automation, is growing in the leaps as well as bound,
aided through the advance computing plus the telecommunication technology. The
Ubiquitous is a trend that is computing the exacerbating challenges
of information security (Abbas, 2015).
It
has more target, more perpetrators as well as more opportunities to exploits,
sabotage system. By the information, tools there are more websites for
attacking the systems as well as knowledge.
Internet, as well as the Cyberspace, specifically
is often viewed as the virtual world for transcends time and space. In
the Cyber-attacks, all the development that exploit the vulnerabilities in the
IP networks also has real-world consequences outside a necessary cost. A
measure of the tailored security system is implemented to meet the goal of organizational
security. With the rapid growth of the business and its environment, the
threats are also increasing for all of these organization. But to secure the information of the
organization is one the most important task for any organization (Solms & Niekerk, 2013). The managers of the
organization are taking strict action to overcome such kinds of threats and
problems by using the new tools and techniques of information security. Security issues and dangers are a major reason for utilizing ESM over an organization. Dangers can
come from inner or outside to
the company. More organizations are finding that in
spite of their use of Web firewalls,
an indeed greater risk to corporate information is made by displeased or temporary employees. They
may comprise of the
misfortune of information,
unauthorized administrations running on
servers or the introduction of infections into
the work environment.
These are some
main issues, which effects on the implementing security enterprises management
implementation. The basic assets of
the enterprise servers, applications,
existing security point gadgets, etc. ought to be recognized and recorded. This will give the
company a pattern of resources that require being tended to in the
security arrangement. Will the arrangement be required to
supply scope for bequest frameworks?
Conclusion on
Governance Issues in Information Security Management
Summing up the
discussion about information security management, it can be said that the data
or information of a company is a confidential part of the company. All the
employees are required to protect it in many ways. But unfortunately, if the
data or any information, secret plans of the company are leaked by some
viruses, hackers, or malware, it leads to a loss of the company. That data may
be used then by any other organization or any person. Hazards and unforeseen
circumstances may occur in an organization. In large organizations, the ethical
issue related to information security management is less likely to occur,
because more of the employees in large organizations are professional and
experienced people. They have to be accountable for all of the security
measures they are doing in the organization. On the other hand, the SMEs are
likely to spend their money on the information security that also creates
ethical problems in the organization. The larger organization has a
well-organized team for the Information security management and because they
invest a lot in security so the ethical issue in the security is less likely to
occur (Harris & Patten, 2014).
On the other
side, the IT expertise of the small to medium size of association is also
extremely low so that they are not possible to recognize any of the troubles
connected to the cybersecurity on time before any major harm. The large
organizations have many of the IT experts in their company that make the
organization conscious of any sort of the cybersecurity associated problem on
time before any trouble, this was also likely to make the make a large
organization more hazard-free as compare with the SMEs. Therefore, we can say
that the SMEs should also focus on information security so that their data
remain secure and private to the organization.
References of
Governance Issues in Information Security Management
Abbas, J. (2015). INFORMATION SECURITY MANAGEMENT FOR
SMALL AND MEDIUM SIZE ENTERPRISES. Sci.Int., 7(3), 2393-2398.
Alexander, D. (2015). Disaster and Emergency Planning
for Preparedness, Response, and Recovery. natural hazard science, 150.
Anas Tawileh, J. H. (2007). Managing Information
Security in Small and Medium Sized Enterprises: A Holistic Approach. ISSE.
Bhaskar, R., & et.al. (2013). Information
Technology Security Management. Computer and Information Security Handbook
(Third Edition), 35-44. doi:10.1016/B978-0-12-803843-7.00027-2
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S.
(2013). Cloud Computing-Based Forensic Analysis for Collaborative NetworkSecurity
Management System. TSINGHUA SCIENCE AND TECHNOLOGY, p 4 0-5 0.
Cohen, G. (2014, January 30). Best practices for
network security management. Retrieved from Best practices for network
security management | Network World
Harris, M. A., & Patten, K. P. (2014). Mobile
device security considerations for small- and medium-sized enterprise business
mobility. Information Management & Computer Security, 22(1), 97-114.
Hu, Q. (2012). Managing Employee Compliance with
Information Security Policies: The critical role of Top Management and
Organizational Culture. Decision Sciences Journal, 43(4).
Inscnetnetworks. (2016, September 6). 5 Benefits Of
IT Security Services That You Need To Know. Retrieved from
https://www.slideshare.net/inscnetnetworks/5-benefits-of-it-security-services-that-you-need-to-know
KOURIK, J. L. (2011). For Small and Medium Size
Enterprises (SME) Deliberating Cloud.
Lopes, I., & Oliveira, P. (2014). Understanding
Information Security Culture: A Survey in Small and Medium Sized Enterprises.
Sadowsky, G., & et.al. (2003). INFORMATION
technology security Handbook. Washington, DC 20433. Retrieved from
https://www.infodev.org/infodev-files/resource/InfodevDocuments_18.pdf
SANGHANI, N. K., & VIJAYAKUMAR, B. (2012). Cyber
Security Scenarios and Control for Small and Medium Enterprises. Informatica
Economică, 16(2).
Solms, R. v., & Niekerk, J. v. (2013). From
information security to cybersecurity. computer and security, 97-102.
Tipton, H. F. (2014 ). Information Security
Management Handbook, Fourth Edition, London, New York, Washington: CRC
Press.
turnoff, m. (2013). Multiple perspectives on planning
for emergencies: An introduction to the special issue on planning and foresight
for emergency preparedness and management. science direct, 1657-1656.