Security Criteria Awareness
Total Page:16
File Type:pdf, Size:1020Kb
Security Criteria Awareness Overview of Security Criteria Awareness in Finnish Companies Rantanen Master’s Thesis 05 2021 Technology, communication, and transport Master’s Degree in Cyber Security Description Rantanen, Otto Security Criteria Awareness - Overview of Security Criteria Awareness in Finnish Companies Jyväskylä: JAMK University of Applied Sciences, May 2021, 79 pages. Technology, communication, and transport. Degree Programme in Cyber Security. Master's thesis. Permission for web publication: Yes Language of publication: English Abstract Dell is a large American company with roots dating back to 1984. In 2015, Dell embarked on a project to acquire EMC Corporation, which was completed in one of the largest acquisitions in the IT industry and re- sulted in Dell Technologies. Because of its broad product and service portfolio, Dell Technologies is involved in the infrastructure of almost every Enterprise-level company and, to a significant extent, smaller compa- nies. The idea for the work came from my empirical findings when working with client companies. Dell Technolo- gies ’service portfolio is constantly expanding, but leveraging it more efficiently requires an understanding of customer companies’ internal processes and needs. The purpose of the dissertation is to get an idea of Dell Technologies' customer companies’ knowledge of security criteria’s, as well as the possible need for external assistance in the Finnish customer field, so that Dell Technologies can better target its services to the right needs in a right way. Theme interview was chosen as the research method as it allows gathering large amounts of data from a relatively small sample. Theme interview is qualitative research method and results from the interviews were analysed by using narrative analysis and pointing out the answers to the questions. Other relevant and possibly useful data was also analysed and the data from which the conclusions were drawn can be found from the document. The most significant consideration was how large the difference in knowledge and application of the crite- ria was between public and private sector actors. Due to the small sample size, this should be treated with caution and the companies' industry can also have a significant impact on the results. Conclusions were drawn from a seemingly small sample, but the data collected helped to a significant ex- tent to understand the needs of customer companies and how to target services to them. Possible further research around the topic could improve Dell Technologies' competitiveness in Finland's relatively small market area where service provision plays a significant role. Keywords/tags (subjects) Appliance, Cyber Security, Dell Technologies, Framework, Security Criteria Miscellaneous (Confidential information) Appendices 3-6 are confidential and removed from the public thesis. The basis for secrecy is section 24(17) of the Act on the Openness of Government Activities (621/1999), a company’s business or trade secret. The period of secrecy is five (5) years, the secrecy will end on 25th of May 2026. 1 Contents Acronyms ............................................................................................................................ 4 1 Introduction ................................................................................................................ 5 1.1 Thesis Scope and Goals ..................................................................................................... 6 1.2 Dell Technologies .............................................................................................................. 7 1.3 Selected Research-Method ............................................................................................... 8 1.3.1 Narrative Analysis .................................................................................................. 12 1.3.2 Sentiment Analysis................................................................................................. 12 1.4 Goal of this Thesis ........................................................................................................... 13 1.4.1 Research Question ................................................................................................. 13 1.5 Previous Research ........................................................................................................... 14 1.5.1 Summary ................................................................................................................ 14 2 Theoretical Base ........................................................................................................ 16 2.1 DELL Technologies Services ............................................................................................. 17 2.1.1 Basic Deployment .................................................................................................. 19 2.1.2 ProDeploy .............................................................................................................. 19 2.1.3 ProDeploy Plus ....................................................................................................... 19 2.1.4 Additional Deployment Time ................................................................................. 20 2.2 Appliance-based Infrastructure Solutions....................................................................... 20 2.2.1 Dell Technologies Cloudboost ............................................................................... 21 2.2.2 Dell Technologies PowerStore ............................................................................... 21 2.2.3 Dell Technologies VxRail ........................................................................................ 22 2.3 Appliance Related Vulnerabilities ................................................................................... 22 2.4 Global Cyber Events ........................................................................................................ 26 2.4.1 1994 – Russian Hacker Case .................................................................................. 26 2.4.2 Slammer Worm ...................................................................................................... 26 2.4.3 2020 – Vastaamo Data Breach in Finland .............................................................. 27 2.5 Common Frameworks for IT-system Benchmarking ....................................................... 28 2.5.1 NIST Cybersecurity Framework ............................................................................. 28 2.5.2 HIPAA ..................................................................................................................... 30 2.5.3 PCI-DSS ................................................................................................................... 32 2.5.4 KATAKRI ................................................................................................................. 33 2.5.5 PITUKRI................................................................................................................... 34 2.5.6 Common Criteria - ISO/IEC 15408 ......................................................................... 38 2.6 Theory Summary ............................................................................................................. 39 2 3 Theme Interviews ...................................................................................................... 41 3.1 Interview Invitation ......................................................................................................... 41 3.2 Interview Participants ..................................................................................................... 41 3.3 Interview Questions ........................................................................................................ 42 3.4 Interview Summaries ...................................................................................................... 43 3.4.1 Company A ............................................................................................................. 43 3.4.2 Company B ............................................................................................................. 45 3.4.3 Company C ............................................................................................................. 47 3.4.4 Company D ............................................................................................................. 48 4 Interview Results ....................................................................................................... 51 4.1 Overview of Results ......................................................................................................... 51 4.2 Sentiment Analysis Results ............................................................................................. 60 5 Analysis ..................................................................................................................... 65 6 Conclusions ............................................................................................................... 69 7 Discussions ................................................................................................................ 72 8 Further Study ............................................................................................................. 75 Appendices ......................................................................................................................