ProtectingSmall and Medium Ent
ProtectingSmall and Medium Ent
Article
ProtectingSmall and Medium Enterprises: A Specialized
Cybersecurity Risk Assessment Framework and Tool
Mohammed El-Hajj *,† and Zuhayr Aamir Mirza †
Department of Semantics, Cybersecurity & Services, University of Twente, 7522 Enschede, The Netherlands
* Correspondence: [email protected]
† These authors contributed equally to this work.
Abstract: As the number of Small and Medium Enterprises (SMEs) rises in the world, the amount of
sensitive data used also increases, making them targets for cyberattacks. SMEs face a host of issues
such as a lack of resources and poor cybersecurity talent, resulting in multiple vulnerabilities that
increase overall risk. Cybersecurity risk assessment frameworks have been developed by multiple
organizations such as the National Institute of Science and Technology (NIST) and the International
Organization for Standardization (ISO), but they are complicated to understand and challenging to
implement. This research aimed to create an effective cybersecurity risk assessment framework specif-
ically for SMEs while considering their limitations. This was achieved by first identifying common
threats and vulnerabilities and categorizing them according to their importance and risk. Secondly,
popular frameworks like the NIST CSF and ISO 27001/2 were analyzed for their proficiencies and
deficiencies while identifying relevant areas for SMEs. Finally, novel techniques catered to SMEs
were explored and incorporated to create an effective framework for SMEs. This framework was also
developed in the form of a tool, providing an interactive and dynamic environment. The tool was
effective, and the framework is a promising start but requires more quantitative analysis.
Keywords: SMEs; risk assessment; cybersecurity framework; NIST; ISO; risk mitigation
it even more challenging for SMEs to recover and strengthen their cybersecurity posture.
Consequently, SMEs may struggle to implement effective cybersecurity measures, further
increasing their susceptibility to future attacks.
Due to this complexity, a large number of SMEs tend to ignore parts of the framework
and employ a ‘fail-safe’ approach, where they attempt to cover most bases to avoid critical
errors [5]. Moreover, there are numerous threats to SMEs which can be categorized as
physical, psychological, and technical [6]. It has been reported that one in three startups that
are affected by a cyberattack end up shutting down due to financial loss and the inability to
recover [6]. This grim statistic reflects the need for a framework that can better protect SMEs
while being easy to implement. It is important to note that these threats are not unique to
SMEs; large organizations also face similar types of threats. However, the scale and impact
of these threats can differ significantly. For example, while large organizations may also be
vulnerable to physical attacks, psychological manipulation, and technical breaches, they
often have more resources and established protocols to manage and mitigate these risks. In
contrast, SMEs may experience more acute consequences due to limited resources and less
robust security measures. Consequently, the same types of threats can affect both SMEs
and large organizations, but the extent and nature of the impact can vary [7].
Several cybersecurity frameworks aim to provide a structure for firms to protect them-
selves from cyber threats. Examples of such frameworks include the NIST Cybersecurity
Framework, ISO 27001/2 [8], Essential Eight, and PCI-DSS. Each of these frameworks has
advantages and disadvantages but does not completely cater to SMEs, since they can be
notoriously difficult to implement and understand [9]. They are complex for SMEs since
they utilize a lot of technical language, which is unfamiliar to non-security professionals.
Furthermore, creating new processes and systems requires resources and a properly built
infrastructure, which may not always be the case for SMEs.
Despite their comprehensive nature, existing frameworks are generally designed with
large organizations in mind. They require significant expertise, financial resources, and
dedicated personnel for successful implementation. SMEs, on the other hand, often lack
these resources and struggle with scalability issues that prevent them from fully leveraging
these frameworks [5]. As a result, many SMEs adopt a ‘fail-safe’ approach, covering only
critical areas and leaving significant gaps in their overall cybersecurity posture.
This research bridges this gap by developing a tailored cybersecurity risk assessment
framework specifically for SMEs. Our framework takes into consideration the resource
constraints and unique operating environments of SMEs while simplifying the implementa-
tion process without sacrificing effectiveness. By analyzing popular frameworks like NIST
CSF and ISO 27001/2, we identified areas where these frameworks excel but also have
limitations when applied to SMEs. The contributions of this paper include the following:
• A comparative analysis of existing frameworks (NIST CSF, ISO 27001/2) to highlight
their proficiency in addressing general cybersecurity threats and their shortcomings
in adapting to SME-specific requirements.
• The identification and categorization of common threats to SMEs, prioritizing risks
based on impact and likelihood, specifically focusing on malware, phishing, and
web-based attacks.
• The development of novel, resource-efficient cybersecurity techniques tailored to
SMEs, incorporating elements from existing frameworks but optimizing them for
simplicity and ease of use.
• The creation of an interactive tool that dynamically guides SMEs through the cyber-
security assessment process, providing clear, actionable steps based on their specific
risk profile.
2. Problem Statement
This section provides a short description of the problems that SMEs are facing, along
with an introduction to the research questions.
Electronics 2024, 13, 3910 3 of 24
3. Background
This section aims to provide an overview of the literature review exploring RQ1
and RQ2. This will provide knowledge to develop the framework by considering spe-
cific vulnerabilities faced by SMEs and examining the advantages and disadvantages of
popular frameworks.
breaches in their infrastructure or policies [19]. As SMEs continue to adopt cloud solutions,
addressing these cloud-specific security issues becomes crucial. Ensuring robust cloud
security involves implementing strong access controls, regularly reviewing configurations,
and employing encryption for data in transit and at rest. This aspect of cybersecurity is
vital for SMEs to mitigate the risks associated with their growing use of cloud technologies.
These three threats can have serious consequences for SMEs since ENISA has also
reported that the frequency of such attacks will rise over time [14]. Each of the threats
also corresponds to common vulnerabilities that SMEs face, such as a lack of expertise
in cybersecurity and poor cybersecurity posture. The technical threats are a direct result
of having poor security throughout their system by failing to implement a framework.
Phishing directly targets employees lacking proper training, and it can cause data breaches
through links, presenting a serious challenge [17]. Section 3.1.1 highlights one of the most
important vulnerabilities for SMEs.
the challenges associated with this framework are similar to previous ones. It is quite
comprehensive and can be difficult to implement for small businesses since a lot of key
indicators like stakeholders, scope, and goals need to be established.
ISO/IEC 27701 is an extension of ISO 27001/2 in the domain of GDPR compliance
and data privacy. The extension upgrades the ISMS to a Privacy Information Management
System (PIMS) which demonstrates GPDR compliance since the company is handling their
private data and the data of others in a compliant manner [32]. However, since this is an
extension of the ISO 27001/2, this means that the implementation of the IS0 27001/2 is a
pre-requisite. Implementing the ISO 27001/2 is already a difficult task for SMEs, meaning
that this framework is a bit of an unrealistic option.
Table 2 shows an overview of the frameworks with their advantages, their disadvan-
tages, their focus, and their key components.
4. Related Work
This section specifically covers academic research that concerns the design of a new
cybersecurity risk assessment framework for SMEs. These solutions take into account
the resource constraints faced by SMEs. It is crucial to explore solutions that have been
developed, to combine their advantages and build upon their limitations. This section
Electronics 2024, 13, 3910 7 of 24
contains solutions that build upon previous information discussed in the literature review.
These solutions target SME vulnerabilities to improve their defenses while building upon
the weaknesses of previously discussed popular frameworks as well. This results in novel
solutions, specifically made for SMEs.
In [37], the authors proposed an analysis of the cybersecurity challenges faced by Small-
to-Medium-sized enterprises (SMEs), highlighting the importance of robust cybersecurity
practices in the digital era. While SMEs form a critical part of global economies, many are
ill-equipped to handle cyber threats, making them vulnerable to attacks. The study reviews
current research on SME cybersecurity and examines how well it aligns with established
frameworks, such as the National Institute of Standards and Technology (NIST) and the
Cybersecurity Framework (CSF). The authors note that most studies focus heavily on the
‘Identify’ and ‘Protect’ functions of the NIST CSF, with insufficient attention paid to the
other crucial activities—‘Detect’, ‘Respond’, and ‘Recover’. This lack of balance leaves
SMEs unprepared to effectively respond to or recover from cyber incidents. The paper calls
for future research to strike a more balanced approach and encourages the use of rigorous
mathematical models to test cybersecurity strategies. Additionally, it urges governments
and academic institutions to provide incentives for researchers to expand the scope of
cybersecurity studies, particularly in areas relevant to SMEs.
5. Framework
This section of the research covers all aspects of the framework that was constructed
based on the literature review about SME vulnerabilities, established frameworks, and
promising solutions. It provides a brief overview of the framework, later diving into
each section and explaining its rationale. Figure 1 shows the start of the framework. The
framework not only provides SMEs with guidance on addressing cybersecurity threats
but also integrates practical tools that SMEs can use to implement these solutions. One of
the key aspects of this framework is its focus on actionable measures through the use of
digital tools, such as the URL classifier. The developed tool brings the framework to life
by allowing SMEs to combat specific threats, such as phishing, which is highlighted in the
framework’s tier-based solutions for web-based attacks. The URL classifier exemplifies how
the framework’s advice on security posture, including threat-based risk assessment and
LCCI, can be translated into a practical, user-friendly tool that directly aids in mitigating
potential threats. By integrating this tool with the framework, SMEs can efficiently opera-
tionalize the guidance offered, ensuring that their employees are better equipped to detect
and avoid phishing attacks. This approach makes the framework not just a theoretical
construct but a comprehensive solution that provides both guidance and practical tools for
daily use.
Electronics 2024, 13, 3910 9 of 24
5.1. Overview
This custom framework for SMEs combines aspects from promising solutions such
as threat-based risk assessment, LCCI, and SDT to create a framework for SMEs. The
framework is organized in such a way as to first provide general advice to establish a
decent cybersecurity posture, based on advice from established frameworks and current
research. These are basic security principles that all firms should generally follow.
The framework aims to aid SMEs in understanding their business on multiple levels,
such as identifying their assets, potential vulnerabilities, and administrative processes, and
examining the employee work environment. Moreover, the framework offers tier-based
solutions for phishing, malware, and web-based attacks. The legal section offers advice to
firms about the General Data Protection Regulation (GDPR) and cyber insurance. Finally,
the support section discusses the opportunity for firms to collaborate for common solutions.
The general overview/structure for these sections can be seen in Figure 2. For the three
threats, levels of security will be established, which can be applied by SMEs, depending on
their resource limitations. This is a combination of both threat-based risk assessment and
LCCI, incorporating two promising solutions.
Threat-based risk assessment allows companies to create specific plans for the potential
threats in their business. By first identifying the relevant threats/risks, they can take steps to
mitigate and prevent them from occurring. LCCI is also important because it has different
levels of security that can be implemented by SMEs. Firms first identify their MCAs, after
which a solution that properly fits within their parameters and implementation is chosen.
These levels also make it possible for SMEs to scale up their security structure as they grow.
Figure 2 showcases interactions between the components of the framework.
Electronics 2024, 13, 3910 10 of 24
Fundamentals
of URL
Information Classifier
Security Solutions to
Common
Problems
Practical Tool
Support and
Community
Cyber
Insurance
Legal Consid-
Framework erations
General
Data
Protection
Threat-Based Regulation
Risk (GDPR)
Assessment
Business
Level
Tier-Based
Solutions
Administrative Employee
Level Level
and the common ways that they enter these systems are also discussed. Finally, tier-based
solutions are offered based on different resource requirements, with each solution building
upon the previous one.
5.5.1. GDPR
The General Data Protection Regulation is a document that sets out a formal process
and guidance for firms to handle the data of EU citizens in an organized and secure manner.
This involves allowing data subjects to provide and rescind consent for their data usage at
any time. Therefore, companies that are based in the EU or manage EU citizens’ data need
to be familiar with the GDPR and ensure that its principles are being upheld; otherwise,
they will face punishment in the form of fines.
6. Tool
This section provides an overview of the tool that was developed with the framework,
while also diving into design choices, limitations, and future extensions. This tool creates
a practical version of the framework, in this case, combating phishing through the use
of a URL classifier. The URL classifier tool serves as a practical implementation of the
framework’s core principles. By developing a tool that enables SMEs to classify and identify
potentially malicious URLs, the framework moves beyond theoretical guidance and equips
businesses with a hands-on solution to one of the most prevalent cybersecurity threats.
The tool supports the framework’s aim of improving SMEs’ cybersecurity posture by
automating aspects of threat detection and allowing employees to take immediate action
based on real-time classification results. This reinforces the framework’s focus on scalable,
actionable solutions that SMEs can adopt within their resource constraints.
6.1. Overview
The tool represents the framework digitally in the form of a web-based application, to
improve interactivity and accessibility for users. The tool contains a machine learning (ML)
model that can be used to classify URLs. Users can input links, and the application will
classify them using the model. Implementing a threat detection model is important since
phishing has become increasingly complicated to detect for employees. Protection is vital
since phishing can be a precursor to malware and web-based attacks. Employees can use a
Electronics 2024, 13, 3910 13 of 24
practical tool to check any links that they have received, thus providing another layer of
security.
7. Results
This section of the article covers both qualitative and quantitative results for the frame-
work and the tool. It is important to note that most research conducted for frameworks is
usually qualitative, meaning that their actual effectiveness is unknown. To properly assess
a framework, quantitative assessments need to be conducted to verify its impact on firms.
Therefore, a structured pilot assessment proposal is explored at the end of the section.
proaches [48–50]. Compared to these existing approaches, our classifier offers several
specific contributions:
• The use of a novel feature set tailored to the specific needs of our dataset significantly
enhances the model’s ability to differentiate between malicious and benign URLs.
• An improved accuracy of 98%, which surpasses the performance of some traditional
classifiers, demonstrating its effectiveness in practical applications.
• A user-friendly interface that integrates seamlessly with existing workflows, allowing
employees to classify URLs efficiently and make informed decisions about link safety.
Our classifier’s performance and practical integration distinguish it from other models
and highlight its specific contributions to the field of URL classification.
Strengths Weaknesses
• Modular structure. • Untested with SMEs about utility.
• Tier-based security solutions based • Focused on three common threats.
on resources. • Dependence on compliant and
• Focus on practical employee training. consistent employees.
• Focus on common threats. • Still technical for readers without background
• Encourages creation of support network for knowledge.
SMEs. • Higher-tier solutions can be resource-intensive.
• Offers legal information.
Opportunities Threats
• Continuous evolution of threat landscape.
• Large market of SMEs for potential use.
• Need for periodic review and updates to
• Can be scalable for businesses.
prevent obsolescence.
• Tool offers a practical use of the framework.
• Competition with established frameworks.
• Integration with other tools opens more
• SMEs may not be comfortable shifting
pathways.
frameworks/policies.
7.3.1. Advantages
The detailed inclusion of the fundamentals of information security and focus on
employee training were positives. The tier-based system for threats was also highlighted
as a positive. The structure of the framework with interconnected sections and the use
of a practical tool were also positives since they could be used by employees throughout
a business.
Electronics 2024, 13, 3910 17 of 24
7.3.2. Disadvantages
However, as with any novel framework, clear disadvantages were also noted. Limiting
the framework to three threats provides a narrow focus since businesses can face threats
outside this domain, leading them to be potentially unprepared. The need for quantitative
analysis further emphasizes the need for a pilot assessment with SMEs. Finally, the depen-
dence on employee compliance and training can be a pitfall without the proper procedures
to facilitate SDT and intrinsic motivation.
7.3.3. Recommendations
Properly motivating employees to be cyber-secure can be achieved through incen-
tivization using quizzes or gameifying cybersecurity training. By motivating employees
with a reward, they may attain more knowledge and make an extra effort to learn principles
from the framework.
4
3.5
3 3
Mean Score
3
2.5
0
Clarity Scope Utility Practicality
Trait
Figure 6. Mean scores for framework traits.
7.5.3. Evaluation
During this phase, the data gathered will be evaluated on different metrics such
as security incidents faced by the SMEs, employee awareness of cybersecurity, and the
SMEs’ feedback on the framework itself. At the end of this phase, the framework’s ef-
fectiveness in a real-world situation can be evaluated and can be improved based on the
feedback received.
8. Discussion
The discussion section aims to critically evaluate the findings from the development
and implementation of the cybersecurity framework and tool designed for SMEs. This sec-
tion will explore the strengths and limitations of the proposed solutions, providing insights
into their practical applicability and effectiveness in real-world settings. By analyzing the
qualitative and quantitative data gathered from various assessments, we can determine
the overall impact and potential areas for improvement. The discussion will also address
the broader implications of the framework and tool, considering the evolving nature of
cybersecurity threats and the unique challenges faced by SMEs. Through this analysis, we
seek to offer a comprehensive understanding of the contributions made by this research
and identify opportunities for future work to further enhance the security posture of SMEs.
8.1. Framework
The framework was developed by combining promising solutions from academic
literature with basic structures employed by established frameworks. Nevertheless, it was
important to verify its effectiveness objectively to see if it possesses valuable information
for SMEs. The SWOT analysis shows that the structure of the framework provides multiple
advantages since it focuses on the fundamentals of cybersecurity, emphasizing employee
training as a big part. However, it does have weaknesses, such as a dependence on em-
ployee training, a narrow threat focus, and technical language associated with cybersecurity.
There is a need for periodic review, as the threat landscape is ever-evolving, so that the
framework is not rendered obsolete. The usability report also indicated that although the
framework has practical and useful information, participants found the technical language
and lack of depth challenging. The lack of depth was due to the focus on three threats and
the need for more descriptions. However, these results are qualitative, and quantitative
analysis could provide a more tangible interpretation of the effectiveness of the framework.
Therefore, the proposed pilot assessment can be a good method to quantitatively measure
its effectiveness.
8.2. Tool
The tool was developed using Flask [52], which is a micro web framework known
for its simplicity and flexibility in building web applications. Flask was chosen because
of its lightweight nature and ease of integration with the pre-trained model on the back
end. When a user attempts to classify a URL, a request is made to the back end to predict
the URL, after which it is displayed on the front end. The model had an accuracy of 98%
in properly classifying URLs into different categories. This high accuracy demonstrates
the model’s reliable performance across various categories, making it a valuable tool for
SMEs. Figure 4 shows that the model has a reliable performance across different categories,
meaning that it can be used by SMEs. This classification report demonstrates that the model
Electronics 2024, 13, 3910 19 of 24
exhibits reliable performance across different categories (benign, phishing, defacement, and
malware), making it suitable for Small and Medium-sized Enterprises (SMEs) to utilize.
• High precision across categories: The precision for all categories (benign, phishing,
defacement, malware) is very high, with values ranging from 0.96 to 1. This indicates
that the model is highly accurate in identifying relevant categories with few false
positives. For SMEs, this accuracy is essential in avoiding unnecessary alerts or
incorrect classifications, which could lead to wasted resources or overlooked threats.
• High recall for threat categories: Recall measures how well the model correctly iden-
tifies actual threats. The recall values are 1 for benign, defacement, and phishing
categories and 0.97 for malware. This shows the model’s low rate of missing actual
threats, crucial for SMEs where undetected attacks can have severe consequences.
• Balanced F1-score: The F1-score, which balances precision and recall, is similarly
high across categories, ranging from 0.97 to 0.99. This balance ensures that the model
performs well in distinguishing between benign and harmful categories. For SMEs,
a reliable F1-score means they can trust the model to handle a variety of threats
effectively.
• Consistent performance across categories: The model does not show significant drops
in performance between categories. This consistency indicates that the model is not
biased towards any specific category, ensuring that SMEs can rely on it to handle
multiple types of cyber threats (e.g., phishing, malware, defacement) with equal
effectiveness.
• Scalability for SMEs: Given that SMEs often face resource limitations, they need re-
liable tools that perform well with minimal intervention. The high precision, recall,
and F1-scores across different categories suggest that SMEs can effectively imple-
ment this model without excessive fine-tuning, making it a scalable solution for their
cybersecurity needs.
In summary, the model’s robust performance metrics (precision, recall, and F1-scores
all near 1) across various threat categories ensure that SMEs can confidently rely on it to
enhance their cybersecurity posture.
However, SMEs will have to adjust the model and its dataset depending on the URLs
they encounter. For example, this model will have difficulty in recognizing the top-level
domains of some countries because of the sampled dataset. This means that the model will
need to be adapted based on the specific data used by the SME. The tool has also focused
on combating phishing, which is not the only threat that is faced by SMEs. The reason
for focusing on phishing is that it often serves as a precursor to other attacks, making it
a critical point of intervention. By reducing the probability of human error leading to a
phishing attack, we can significantly improve overall security.
8.3.1. RQ1: What Are the Key Cybersecurity Threats and Challenges Faced by SMEs, and
How Do Existing Frameworks Address These Challenges?
In Section 3.2, we explored common cybersecurity threats such as malware, web-based
attacks, and phishing, which are significant challenges for SMEs. The limitations of existing
frameworks like NIST CSF and ISO 27001/2 in addressing these specific challenges were
also discussed. We identified that these frameworks, while robust, do not fully account for
the unique vulnerabilities of SMEs. This exploration helps in understanding the specific
threats and limitations that SMEs face.
Electronics 2024, 13, 3910 20 of 24
8.3.3. RQ3: How Can the Effectiveness of the Developed Framework and Tool Be
Evaluated and Validated in Real-World SME Environments?
In addressing this research question, we plan to handle the evaluation of the frame-
work and tool through a structured pilot assessment in future work. This pilot assessment
will be conducted over 6–8 months, involving SMEs from various industries to ensure
a diverse dataset. The pilot will include phases for setup, implementation, monitoring,
and evaluation, allowing us to gather both quantitative and qualitative feedback on the
framework’s effectiveness. This approach will ensure a comprehensive validation of the
framework and tool’s impact in real-world SME environments, although the detailed
execution of this pilot is beyond the current scope of the research.
9.1. Limitations
Firstly, the framework focuses on SMEs and is not completely applicable to larger
enterprises, which have a larger attack surface. Solution scalability may be an issue,
but the information should not be disregarded. Companies can still verify their existing
cybersecurity structure.
Secondly, this framework focuses on the top three threats listed by ENISA, which were
malware, web-based attacks, and phishing [14]. However, this list contained 15 threats,
meaning that the framework can be expanded to include these threats. Sections for each
new threat can be added to the framework, along with their corresponding information
and tutorials, as needed. However, this can lead to the problem of high complexity. An
issue with the NIST CSF and ISO 27001/2 is their high technical complexity, leading to a
lack of understanding and motivation. Therefore, it is necessary to ensure the framework
maintains the same level of simplicity.
This research also focused on two frameworks, the NIST CSF and ISO 27001/2. However,
with the large number of frameworks available that may possess better techniques for
certain threats, there is an emphasis on the need for periodic review.
mainly qualitative without a metric of effectiveness. These solutions have been tested
qualitatively through user testing and expert testimonials. Quantitative feedback is yet to
be implemented but is needed to identify whether there is a positive or negative effect. In
addition, obtaining more qualitative feedback from SME owners and leaders could provide
valuable insights into the practical challenges and user experiences associated with the
tool. This qualitative feedback could help in understanding context-specific issues that may
not be fully captured by quantitative measures alone. Conducting detailed interviews or
surveys with SME stakeholders could yield deeper insights into the usability and impact of
the framework, as well as identify additional areas for improvement.
A proposed pilot assessment of the framework could be conducted over 6–8 months,
involving several SMEs from various industries. Selecting SMEs with diverse characteristics,
such as size, focus, and number of employees, would ensure a comprehensive evaluation.
This assessment would provide both qualitative and quantitative data on the framework’s
effectiveness and usability in real-world settings.
The tool could have more checklists to improve its customization and more practicality,
such as a password strength checker and IP assistance.
10. Conclusions
This research addressed the increasing cybersecurity challenges faced by Small and
Medium Enterprises (SMEs) due to their growing reliance on sensitive data, making
them prime targets for cyberattacks. SMEs often struggle with limited resources and
inadequate cybersecurity expertise, leading to significant vulnerabilities that elevate their
overall risk profile. While existing cybersecurity risk assessment frameworks, such as
those developed by the National Institute of Standards and Technology (NIST) and the
International Organization for Standardization (ISO), offer robust guidelines, they are often
too complex for SMEs to effectively implement.
The primary goal of this research was to develop a tailored cybersecurity risk as-
sessment framework specifically designed to meet the needs and limitations of SMEs. To
achieve this, the study began by identifying and categorizing common threats and vulner-
abilities, focusing on those most relevant to SMEs. The research then analyzed existing
frameworks like the NIST Cybersecurity Framework (CSF) and ISO 27001/2, evaluating
their strengths and weaknesses in the context of SMEs.
Based on these insights, the research introduced a novel cybersecurity risk assessment
framework that incorporates effective techniques such as Security Development Tools
(SDTs) and Lightweight Cybersecurity Controls for SMEs (LCCI), with a particular empha-
sis on employee training as a critical component. This framework was further enhanced
by the development of a practical tool, designed to provide an interactive and dynamic
environment for SMEs to assess and manage their cybersecurity risks.
The framework and tool offer a promising start in addressing the cybersecurity needs
of SMEs, but further analysis is required to quantify their effectiveness. The proposed pilot
assessment is a key step in this direction, providing a method for quantitative evaluation.
As the threat landscape continues to evolve, it will be essential to periodically review and
update the framework to ensure its ongoing relevance and effectiveness. This research
lays the foundation for a more accessible and effective approach to cybersecurity for
SMEs, bridging the gap between existing frameworks and the unique challenges faced by
smaller enterprises.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Chidukwani, A.; Zander, S.; Koutsakis, P. A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research
Focus and Recommendations. IEEE Access 2022, 10, 85701–85719. [CrossRef]
2. Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and
business impacts. Comput. Ind. 2020, 114, 103165. [CrossRef]
3. Fernandez De Arroyabe, I.; Fernandez de Arroyabe, J.C. The severity and effects of Cyber-breaches in SMEs: A machine learning
approach. Enterp. Inf. Syst. 2023, 17, 1942997. [CrossRef]
4. Jahankhani, H.; Meda, L.N.K.; Samadi, M. Cybersecurity Challenges in Small and Medium Enterprise (SMEs). In Blockchain and
Other Emerging Technologies for Digital Business Strategies; Jahankhani, H., Kilpin, D.V., Kendzierskyj, S., Eds.; Springer International
Publishing: Cham, Switzerland, 2022; pp. 1–19. [CrossRef]
5. Carías, J.F.; Borges, M.R.S.; Labaka, L.; Arrizabalaga, S.; Hernantes, J. Systematic Approach to Cyber Resilience Operationalization
in SMEs. IEEE Access 2020, 8, 174200–174221. [CrossRef]
6. Saha, B.; Anwar, Z. A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework.
J. Inf. Secur. 2024, 15, 24–39. [CrossRef]
7. Saxena, N.; Hayes, E.; Bertino, E.; Ojo, P.; Choo, K.K.R.; Burnap, P. Impact and key challenges of insider threats on organizations
and critical businesses. Electronics 2020, 9, 1460. [CrossRef]
8. International Organization for Standardization. ISO/IEC 27001:2022 Information Security Management Systems. Available
online: https://www.iso.org/standard/27001 (accessed on 1 May 2024).
9. AL-Dosari, K.; Fetais, N. Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises
(SMEs): A Meta-Analysis Approach. Electronics 2023, 12, 3629. [CrossRef]
10. Islam, M.A.; Khan, M.A.; Obaidullah, A.Z.M.; Alam, M. Effect of Entrepreneur and Firm Characteristics on the Business Success
of Small and Medium Enterprises (SMEs) in Bangladesh. Int. J. Bus. Manag. 2011, 6, 289–299. [CrossRef]
11. Heikkilä, M.; Rättyä, A.; Pieskä, S.; Jämsä, J. Security challenges in small- and medium-sized manufacturing enterprises. In
Proceedings of the 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS), Narvik, Norway,
21–24 June 2016; pp. 25–30. [CrossRef]
12. van Haastrecht, M.; Sarhan, I.; Shojaifar, A.; Baumgartner, L.; Mallouli, W.; Spruit, M. A Threat-Based Cybersecurity Risk
Assessment Approach Addressing SME Needs. In Proceedings of the 16th International Conference on Availability, Reliability
and Security, New York, NY, USA, 17–20 August 2021; p. ARES ’21. [CrossRef]
13. Chindipha, S.; Irwin, B. Evaluation of the Effectiveness of Small Aperture Network Telescopes as IBR Data Sources. Ph.D. Thesis,
Rhodes University, Faculty of Science, Computer Science, Makhanda, South Africa, 2023. [CrossRef]
14. Lourenco, M.; Marinos, L. Web Application Attacks. 2020. pp. 1–20. Available online: https://www.enisa.europa.eu (accessed
on 1 May 2024)
15. Committee on National Security Systems. CNSSI No. 4009: Committee on National Security Systems (CNSS) Glossary 2015.
Available online: https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf (accessed on 1 May 2024).
16. Singh, A.; Sharma, A.; Sharma, N.; Kaushik, I.; Bhushan, B. Taxonomy of Attacks on Web Based Applications. In Proceedings of
the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kerala,
India, 5–6 July 2019; Volume 1, pp. 1231–1235. [CrossRef]
17. Nieles, M.; Dempsey, K.; Yan Pillitteri, V. An Introduction to Information Security. Nist Spec. Publ. 2017, 800, 101. [CrossRef]
Electronics 2024, 13, 3910 23 of 24
18. Khan, N.; Al-Yasiri, A. Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput.
Sci. 2016, 94, 485–490. [CrossRef]
19. Rupra, S.S.; Omamo, A. A cloud computing security assessment framework for small and medium enterprises. J. Inf. Secur. 2020,
11, 201–224. [CrossRef]
20. Pugnetti, C.; Casián, C. Cyber risks and Swiss SMEs: An investigation of employee attitudes and behavioral vulnerabilities.
ZHAW Digit. Collect. 2021, 1, 1–31.
21. Mansfield-Devine, S. Ransomware: Taking businesses hostage. Netw. Secur. 2016, 2016, 8–17. [CrossRef]
22. Luna, A.; Levy, Y.; Simco, G.; Li, W. Proposed Empirical Assessment of Remote Workers’ Cyberslacking and Computer Security
Posture to Assess Organizational Cybersecurity Risks. In Proceedings of the 2022 IEEE High Performance Extreme Computing
Conference (HPEC), Virtual, 19–23 September 2022; pp. 1–2. [CrossRef]
23. Chawla, M.; Chouhan, S.S. A survey of phishing attack techniques. Int. J. Comput. Appl. 2014, 93. [CrossRef]
24. Sangani, N.K.; Vijayakumar, B. Cyber security scenarios and control for small and medium enterprises. Inform. Econ. 2012, 16, 58.
25. López, M.Á.; Enríquez, J.M.L.; López, M.; Jiménez, C.M.A.; Velasco, S.; Braojos, M.A.; García, M.F. Intelligent detection and
recovery from cyberattacks for small and medium-sized enterprises. IJIMAI 2020, 6, 55–62. [CrossRef]
26. Parmar, B. Protecting against spear-phishing. Comput. Fraud. Secur. 2012, 2012, 8–11. [CrossRef]
27. Marican, M.N.Y.; Razak, S.A.; Selamat, A.; Othman, S.H. Cyber Security Maturity Assessment Framework for Technology
Startups: A Systematic Literature Review. IEEE Access 2023, 11, 5442–5452. [CrossRef]
28. Barrett, M. Framework for Improving Critical Infrastructure Cybersecurity, version 1.1; National Institute of Standards and Technology:
Gaithersburg, MD, USA, 2018. [CrossRef]
29. ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—
Requirements. ISO: New York, NY, USA, 2022.
30. Groš, S. A Critical View on CIS Controls. arXiv 2020, arXiv:1910.01721. [CrossRef]
31. Audit, I.S.; Association, C. COBIT 2019 Framework: Governance and Management Objectives; ISACA: Schaumburg, IL, USA, 2018.
32. ISO/IEC 27701:2019; Security Techniques—Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management—
Requirements and Guidelines. ISO: New York, NY, USA, 2019.
33. Benz, M.; Chatterjee, D. Calculated risk? A cybersecurity evaluation tool for SMEs. Bus. Horizons 2020, 63, 531–540. [CrossRef]
34. Ganji, D.; Kalloniatis, C.; Mouratidis, H.; Gheytassi, S.M. Approaches to Develop and Implement ISO/IEC 27001 Standard -
Information Security Management Systems: A Systematic Literature Review. Int. J. Adv. Softw. 2019, 12, 228–238.
35. Pawar, S.; Palivela, D.H. LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises
(SMEs). Int. J. Inf. Manag. Data Insights 2022, 2, 100080. [CrossRef]
36. Sukumar, A.; Mahdiraji, H.A.; Jafari-Sadeghi, V. Cyber risk assessment in small and medium-sized enterprises: A multilevel
decision-making approach for small e-tailors. Risk Anal. 2023, 43, 2082–2098. [CrossRef] [PubMed]
37. Ambreen, L.; Jain, M.; Yadav, R.K.; Loonkar, S. Effective cybersecurity risk management practices for small and medium-sized
enterprises: A comprehensive review. Multidiscip. Rev. 2023, 6, e2023ss080. [CrossRef]
38. Tsokkis, P.; Stavrou, E. A password generator tool to increase users’ awareness on bad password construction strategies. In
Proceedings of the 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy, 19–21
June 2018; pp. 1–5. [CrossRef]
39. Kubariev, O.; Piatykop, O.; Pronina, O.; Levytska, T. The Research on Methods for Generating Random Passwords. In Proceedings
of the 2023 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo),
Kyiv, Ukraine, 13–18 November 2023; pp. 63–66. [CrossRef]
40. Team, E. Why Are Strong Passwords Still Crucial Even with MFA Enabled?—Enpass—Enpass.io. 2023. Available online:
https://www.enpass.io/blog/security/strong-passwords-still-crucial-with-mfa-enabled/ (accessed on 20 April 2024).
41. Möller, D.P.F.; Vakilzadian, H. Cybersecurity Awareness Training: A Use Case Model. In Proceedings of the 2023 IEEE
International Conference on Electro Information Technology (eIT), Romeoville, IL, USA, 18–20 May 2023; pp. 242–247. [CrossRef]
42. Sandhu, R.S. Role-Based Access Control11Portions of This Chapter Have Been Published Earlier in Sandhu et al. (1996), Sandhu (1996),
Sandhu and Bhamidipati (1997), Sandhu et al. (1997) and Sandhu and Feinstein (1994); Elsevier: Amsterdam, The Netherlands, 1998;
Volume 46, pp. 237–286. [CrossRef]
43. Moses, S.; Rowe, D. Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through
Multi-Factor Authentication and other Techniques. Int. J. Inf. Secur. Res. 2016, 6, 667–676. [CrossRef]
44. Donges, N. Random Forest: A Complete Guide for Machine Learning. 2024. Available online: https://builtin.com/data-science/
random-forest-algorithm (accessed on 10 April 2024).
45. Siddhartha, M. Malicious URLs Dataset—Kaggle.com. 2021. Available online: https://www.kaggle.com/datasets/sid321axn/
malicious-urls-dataset (accessed on 20 April 2024).
46. Abad, S.; Gholamy, H.; Aslani, M. Classification of Malicious URLs Using Machine Learning. Sensors 2023, 23, 7760. [CrossRef]
47. Kanstrén, T. A Look at Precision, Recall, and F1-SCore—Towardsdatascience.com. 2020. Available online: https:
//towardsdatascience.com/a-look-at-precision-recall-and-f1-score-36b5fd0dd3ec (accessed on 20 April 2024).
48. Ilias, L.; Roussaki, I. Detecting malicious activity in Twitter using deep learning techniques. Appl. Soft Comput. 2021, 107, 107360.
[CrossRef]
Electronics 2024, 13, 3910 24 of 24
49. Ahammad, S.H.; Kale, S.D.; Upadhye, G.D.; Pande, S.D.; Babu, E.V.; Dhumane, A.V.; Bahadur, M.D.K.J. Phishing URL detection
using machine learning methods. Adv. Eng. Softw. 2022, 173, 103288. [CrossRef]
50. BOUIJIJ, H.; BERQIA, A. Machine learning algorithms evaluation for phishing urls classification. In Proceedings of the 2021
4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Alkhobar, Saudi Arabia, 6–8
December 2021; pp. 1–5.
51. Kenton, W. How To Perform a SWOT Analysis—Investopedia.com. 2024. Available online: https://www.investopedia.com/
terms/s/swot.asp (accessed on 20 April 2024).
52. Copperwaite, M.; Leifer, C. Learning Flask Framework; Packt Publishing Ltd.: Birmingham, UK, 2015.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.
Reproduced with permission of copyright owner. Further reproduction
prohibited without permission.