International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 269

Research Paper | Information Security | Malaysia | Volume 6 Issue 12, December 2017 | Popularity: 6.1 / 10


     

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin, Jamaludin Ibrahim


Abstract: This paper evaluates cybersecurity effectiveness in preserving Maqasid al-Shariah most valuable assets through measuring its ability to protect them from modern cyber threats and cyber-attacks. In order to perform this evaluation we proposed a model that uses Maqasid al-Shariah to decide on the priorities and assets that should be safeguarded and protected from cyber-attacks.


Keywords: Maqasid Shariah Cybersecurity, Islam and Cybersecurity, Islam and Cyberattacks, Islam and Cyber threats, Maqasid Shariah, Cybersecurity capability maturity model, C2M2, MS-C2M2, Cybersecurity,


Edition: Volume 6 Issue 12, December 2017


Pages: 1095 - 1098



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Yassir Izzadin, Jamaludin Ibrahim, "Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 1095-1098, https://www.ijsr.net/getabstract.php?paperid=ART20178654, DOI: https://www.doi.org/10.21275/ART20178654



Similar Articles

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022

Pages: 1404 - 1405

Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)

Santosh Kumar Kande, Alex Harris

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Information Security, United States of America, Volume 13 Issue 10, October 2024

Pages: 1001 - 1002

A Novel Methodology for Tracking and Remediating Third - Party Data Breaches

Vivek Kumar Agarwal

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024

Pages: 176 - 180

Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach

Megha Manglani

Share this Article

Downloads: 16 | Weekly Hits: ⮙2 | Monthly Hits: ⮙5

Research Paper, Information Security, India, Volume 13 Issue 9, September 2024

Pages: 406 - 410

Tracing the Impact of GDPR on Global Data Privacy

Khushal Chauhan, Mayur Ghawate, Saachi Joshi, Shrikant Kawade

Share this Article



Top