ICT502 S1 2024 Research Essay
ICT502 S1 2024 Research Essay
ICT502 S1 2024 Research Essay
Assignment 1
Table of Contents
Introduction....................................................................................................................2
Methodology..................................................................................................................2
Main Body......................................................................................................................3
1. Justifying the need for sound information security management in SMEs.....3
2. Biometric security devices and their usefulness..............................................6
3. Security training and education and implementing SETA programs.............10
4. Linking business objectives with security......................................................12
Conclusion....................................................................................................................13
References....................................................................................................................13
The Need for Information Security
Management for Small to Medium Size
Enterprises (SMEs)
Introduction
This study emphasizes the important need for information security management
within SMEs. By exploring topics such as the need for sound information security
management in SMEs, biometric devices and their usefulness, the implementation of
security training programs, and the alignment of security with business objectives, we
emphasize the importance of protecting digital assets within SMEs. Moreover, we
made comparisons to the demands and strategies of larger organizations.
Ultimately, this article seeks to contribute to the continuing debate on information
security management by making practical recommendations and emphasizing the
importance of prioritizing cybersecurity in the SME sector.
Methodology
In this study, we utilized online search tools like Google Scholar and IEEE Xplore to
gather literature on the information security needs of SMEs. We employed keywords
such as ‘SMEs’, ‘information security, cyber threats, ‘biometric security’, etc., to find
the most relevant and recent studies.
After collecting the literature, we conducted a detailed review to understand each
paper’s main points, arguments, and conclusions. This approach helped us gain an in-
depth understanding of SMEs’ needs in information security management and how to
meet these needs through effective strategies and practices.
Main Body
management in SMEs
SMEs, accounting for nearly 95% of global enterprises and contributing over
70% to GDP, face unique information security risks due to their size and
resources ( Khan, Tanwar, & Rana, 2020).
for SMEs
Biometric security devices offer distinct advantages for both SMEs and large
organizations, with variations in application due to scale and requirements.
Biometric technology meets these needs by allowing for customized deployment. ( Iyer,
A. Impacts on SMEs:
Enhanced Efficiency: Biometric security systems streamline operations for
SMEs, allowing employees to access premises swiftly with minimal hassle
(Phadke, 2013).
Biometric security systems offer significant advantages for both SMEs and
large organizations. For SMEs, these systems provide efficient security
measures within budget constraints, while for large enterprises, they offer
robust protection against cyber threats and regulatory compliance.
programs
Organizations
Security Education, Training, and Awareness (SETA) programs are crucial for
both SMEs and large organizations. While both SMEs and large organizations
face cybersecurity challenges, their approaches to implementing SETA programs
may diverge due to differences in resources, workforce size, and threat
landscapes.
A. Resource Allocation and Capability: Large organizations typically have
more resources and dedicated security teams, enabling them to undertake
comprehensive SETA initiatives, while SMEs may face resource
constraints that hinder the implementation of comprehensive SETA
initiatives. (Chen, Ramamurthy, & Wen, 2015). Limited budgets and staff
at SMEs may limit their capacity to develop and provide effective security
training to employees.
While the challenges and strategies for implementing SETA programs differ
across SMEs and large organizations, the overall goal remains consistent: to
cultivate a security-aware workforce capable of effectively reducing cyber threats.
Organizations can adjust their security training activities to meet individual needs
while also strengthening their overall cybersecurity posture by drawing on
existing literature.
B. How They Do Security: SMEs usually have fewer resources and know-how,
so they might prefer using outside help for security, like cloud security
services or outsourcing security tasks. But big companies often build their
own security teams and use custom-made solutions they develop themselves.
This shows how the two types of organizations balance flexibility and
practicality in their security strategies.
C. Dealing with Risks: Both SMEs and big companies need to handle different
security risks, but they might do it in different ways because of their size and
resources. SMEs might focus more on staying flexible and being able to react
quickly to problems. They use simpler ways to manage risks that work for
their smaller operations. But big companies might use more structured and
systematic risk management methods to cover all their different business parts
and information.
From these points and what we know, it's clear that connecting business goals
with security is a big deal and needs to be customized based on the organization's
size, industry, and resources. Understanding the differences between SMEs and
large companies is crucial for making effective security plans that fit each
organization's needs.
Conclusion
Iyer, A. P., Karthikeyan, J., Khan, R. H., & Mathew, B. P. (2020, 4). AN ANALYSIS
OF ARTIFICIAL INTELLIGENCE IN BIOMETRICS-THE NEXT LEVEL
OF SECURITY. Journal of Critical Reviews, 7(1), 571-576.
doi:10.31838/jcr.07.01.110
Khan, M. I., Tanwar, S., & Rana, A. (2020). The Need for Information Security
Management for SMEs. 2020 9th International Conference System Modeling
and Advancement in Research Trends (SMART), 328-332.
doi:https://doi.org/10.1109/SMART50582.2020.9337108
Alqatawna, J. (2014). The Challenge of Implementing Information Security Standards
in Small and Medium e-Business Enterprises. Journal of Software
Engineering and Applications, 7(10), 7. doi:10.4236/jsea.2014.710079
Chen, Y., Ramamurthy, K. (., & Wen, K.-W. (2015). Impacts of Comprehensive
Information Security Programs on Information Security Culture. Journal of
Computer Information Systems, 55(3), 11-19.
doi:10.1080/08874417.2015.11645767
Phadke, S. (2013, 10). The Importance of a Biometric Authentication System. The SIJ
Transactions on Computer Science Engineering & its Applications (CSEA),
1(4), 128-132. doi:10.9756/SIJCSEA/V1I4/0104550402
Wallang, M., Shariffuddin, M. D., & Mokhtar, M. (2022, 12 31). CYBER SECURITY
IN SMALL AND MEDIUM ENTERPRISES (SMEs): WHAT’S GOOD OR
BAD? Journal of Governance and Development (JGD), 18(1), 75–87.
doi:https://doi.org/10.32890/jgd2022.18.1.5