3.1 Does a Security Organization with
Defined Roles and Responsibilities
Exist?
Since the customer must take a holistic approach to
cyber security, it is necessary that basic roles within a
security organization must be named. The
entrepreneur is therefore responsible for the
organization of IT security in his company, but he
cannot manage the task alone: the development of an
IT security organization is necessary (Harris and
Maymi, 2016). Depending on the size of the
company, there are distinctive characteristics that can
be considered. In a small company with 10 to 20
employees, it is hardly possible to create jobs that
deal exclusively with the topic of IT security.
Medium-sized companies may have the financial
means and the need for one or two full-time IT
security jobs. International corporations cannot do
without an extensive IT security organization. In
general, IT security must be exemplified.
Management must make the decisions, set precise
targets and, of course, set a good example for
implementation. In addition, IT security must be
carried to all areas of the company, and it must be
made clear that every employee is part of the IT
security organization. An IT security officer should
be appointed, even if not required by law (BSI, 2017).
This can be an own employee or an external service
provider.
For core tasks, suitable employees must be
appointed and equipped with sufficient skills. This is
the only way to enforce the guidelines. It goes without
saying that the responsible employee must be given
the necessary freedom to perform his or her duties
adequately. Separation of functions is essential. For
example, the IT administrator may not be responsible
for creating IT security policies at the same time
(ISO, 2013). All employees and executives (including
management staff) must be regularly updated of the
importance of compliance with the established
guidelines (e.g. COSO, 1992). This can be done
through training, but better through advanced training
or even small IT security competitions.
3.2 Do Employees Succeed in Raising
Awareness and Training on
Information Security and
Cyber-security?
Adverse behaviour is the most common cause of
damage. Human beings continue to be the greatest
vulnerability in IT and non-digital information
security. Whether out of good faith, ignorance or bad
faith - confidential company data quickly falls into
the wrong hands or the network is infected (Warren
and Bayuk, 2009). For example, phishing e-mail
addresses are a widespread form of social
engineering. Probably every user has already found
such an email in his/her inbox. They can be used to
pretend that you have completed a transaction on
eBay, Amazon or PayPal with errors. You should
correct this by visiting the site. If users follow this
call, they will come across a website that looks very
similar to the original. There they are asked to enter
passwords or Transaction Authentication Numbers
(TANs). If now actually functioning Account-data is
revealed, the theft starts on the real account.
Detection of the fake website is usually easy,
indications are, for example, security certificates
expired, faulty or not available at all. URL or domain
of the website seem strange, like amazon.tv. There are
spelling mistakes in the e-mail and on the website.
Also, not to be despised are USB sticks that seem to
have been left lying on the company car park or in
publicly accessible areas of the company (Harris and
Maymi, 2016). If the curious finder connects such a
stick to the computer, she will catch a sophisticated
Malware or Ransomware and possibly infect a large
part of the company network. Finally, tempting are
the documents contained therein, such as the alleged
salary list of the Executive Board or the candidates
for an upcoming wave of redundancies. It is assumed
that the state-contracted malware Stuxnet also entered
the Iranian atomic plant Natanz via USB stick
(Kushner, 2014).
However, no matter how an attack takes place or
how you assess the threat situation: it is important that
companies take themselves out of liability as far as
possible and if they have established a comprehensive
training and awareness-raising program, claims for
damages can be passed on directly to the perpetrator.
Incidentally, this is also the only sensible method of
protecting oneself against any form of social
engineering. There are many technical measures to
filter e-mails or control accessed websites, but
ultimately the user remains the weakest link in the
chain. It is therefore important that companies
achieve the required maturity level in risk assessment.
3.3 Are There Any Specifications for
the Secure Basic Configuration
(Hardening) of IT Systems?
All measures taken in individual cases can only be
effective to a fraction of their effectiveness as long as
the systems or system components on which they are