Skip to main content

Cyber Security Canvas for SMEs

  • Conference paper
  • First Online:
Information and Cyber Security (ISSA 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1339))

Included in the following conference series:

Abstract

In an increasingly digitalized and networked world, information security and cyber security pose ever greater challenges to organizations. Cyber-attacks cause high economic damage and can bring organizations to ruin. Many small and medium-sized enterprises (SME) are under the illusion that only the large companies are the victims of an attack; they protect their valuable data against this background only poorly. But even in research, the focus is generally not on SMEs. In the context of this work, an easy-to-use Cyber Security Canvas is therefore being modelled to close this gap and to allow SMEs pragmatic access to the topic. The model framework is supplemented with modular building blocks. The building blocks can be put together individually according to the requirements and needs of the SMEs using them, with the model dividing them up according to priority. The newly designed Cyber Security Canvas was put through an application test with a European-based SME in order to gain first insights into its practical suitability in the European context. The model proved to be successful, and was well received by the participant. Nevertheless, it has potential for improvement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Simonet, J., Teufel, S.: The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users. In: Dhillon, G., Karlsson, F., Hedström, K., Zúquete, A. (eds.) ICT Systems Security and Privacy Protection. SEC 2019. IFIP Advances in Information and Communication Technology, vol 562. Springer, Cham (2019)

    Google Scholar 

  2. techbold technology Group AG: Studie Status IT-Sicherheit KMU Österreich 2020. Report. techbold technology group AG und MindTake Research GmbH, Wien (2020)

    Google Scholar 

  3. Bougaardt, G., Kyobe, M.: Investigating the factors inhibiting SMEs from recognizing and measuring losses from cybercrime in South Africa. In: ICIME 2011-Proceedings of the 2nd International Conference on Information Management and Evaluation, Toronto, Canada, pp. 62–70 (2011)

    Google Scholar 

  4. Berry, C., Berry, R.: An initial assessment of small business risk management approaches for cyber security threats. Int. J. Bus. Continuity Risk Manage. 8(1), 1–10 (2018)

    Article  Google Scholar 

  5. Aldabbas, M., Teufel, B.: Human aspects of smart technologies’ security: the role of human failure. J. Electron. Sci. Technol. 14(4), 311–318 (2016)

    Google Scholar 

  6. Wiercioch, A., Teufel, S., Teufel, B.: The authentication dilemma. J. Softw. 13(5), 277–286 (2018). https://doi.org/10.17706/jsw.13.5.277-286

  7. Teufel, S., Teufel, B.: Crowd energy information security culture: security guidelines for smart environments. In: Proceedings of the IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, China, pp. 123–128 (2015)

    Google Scholar 

  8. Schlienger, T., Teufel, S.: Information security culture: the socio-cultural dimension in information security management. In: Proceedings IFIP TC11 17th International Conference on Information Security: Visions and Perspectives, Cairo, Egypt, 7–9 May, 2002

    Google Scholar 

  9. Da Veiga, A., Eloff, J.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196–207 (2010)

    Article  Google Scholar 

  10. Heidt, M., Gerlach, J.P., Buxmann, P.: Investigating the security divide between SME and large companies: how SME characteristics influence organizational IT security investments. Inf. Syst. Front. 21(6), 1285–1305 (2019). https://doi.org/10.1007/s10796-019-09959-1

    Article  Google Scholar 

  11. Solms, R., von Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)

    Google Scholar 

  12. Kersten, H., Klett, G., Reuter, J., Schröder, K.-W.: IT-Sicherheitsmanagement nach der neuen ISO 27001. Springer Fachmedien, Wiesbaden (2016)

    Google Scholar 

  13. Böhmer, W., Haufe, K., Klipper, S., Lohre, T., Rumpel, R., Witt, B.-C.: Managementsysteme für Informationssicherheit (ISMS) mit DIN EN ISO/IEC 27001 betreiben und verbessern. Beuth Verlag GmbH, Berlin (2018)

    Google Scholar 

  14. Deming, W.: Out of Crisis. M.I.T. Center for Advanced Engineering Study, Cambridge, USA (1982)

    Google Scholar 

  15. Calder, A.: ISO27001/ISO27002. IT Governance Publishing, Cambridgeshire (2018)

    Google Scholar 

  16. Federal Office for Information Security (BSI): BSI-Standard 200–2, IT Grundschutz Methodology. BSI, Bonn (2017). https://www.bsi.bund.de/EN/Publications/BSIStandards/BSIStandards_node.html

  17. Nguyen, M.: Konzeption und modellierung eines cyber security canvas. International istitute of management in technology (iimt), University of Fribourg, Fribourg (2019)

    Google Scholar 

  18. National Institute of Standards and Technology (NIST): Framework for Improving Critical Infrastructure Cybersecurity. NIST, Gaithersburg, 16 April 2018

    Google Scholar 

  19. Scherm, E., Pietsch, G.: Organisation: Theorie, Gestaltung. Wandel. Oldenbourg Wissenschaftsverlag GmbH, München (2007)

    Book  Google Scholar 

  20. Hofmann, H., Poltermann, A.: Den Wandel gemeinsam gestalten – Organisations-ent-wicklung “bottom-up” - Handreichung zur Unterstützung von Einrichtungen der beruflichen Rehabilitation. Nürnberg, Forschungsinstitut Betriebliche Bildung (f-bb) gGmbH (2017)

    Google Scholar 

  21. Moosbrugger, H., Kelava, A.: Testtheorie und Fragebogenkonstruktion. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the Canton of Fribourg, Switzerland, through the Smart Living Lab project at the University of Fribourg.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephanie Teufel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Teufel, S., Teufel, B., Aldabbas, M., Nguyen, M. (2020). Cyber Security Canvas for SMEs. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J., Botha, R. (eds) Information and Cyber Security. ISSA 2020. Communications in Computer and Information Science, vol 1339. Springer, Cham. https://doi.org/10.1007/978-3-030-66039-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66039-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66038-3

  • Online ISBN: 978-3-030-66039-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics