Downloads: 112 | Views: 269
Research Paper | Information Security | Malaysia | Volume 6 Issue 12, December 2017 | Popularity: 6.1 / 10
Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah
Yassir Izzadin, Jamaludin Ibrahim
Abstract: This paper evaluates cybersecurity effectiveness in preserving Maqasid al-Shariah most valuable assets through measuring its ability to protect them from modern cyber threats and cyber-attacks. In order to perform this evaluation we proposed a model that uses Maqasid al-Shariah to decide on the priorities and assets that should be safeguarded and protected from cyber-attacks.
Keywords: Maqasid Shariah Cybersecurity, Islam and Cybersecurity, Islam and Cyberattacks, Islam and Cyber threats, Maqasid Shariah, Cybersecurity capability maturity model, C2M2, MS-C2M2, Cybersecurity,
Edition: Volume 6 Issue 12, December 2017
Pages: 1095 - 1098
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022
Pages: 1404 - 1405Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)
Santosh Kumar Kande, Alex Harris
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Information Security, United States of America, Volume 13 Issue 10, October 2024
Pages: 1001 - 1002A Novel Methodology for Tracking and Remediating Third - Party Data Breaches
Vivek Kumar Agarwal
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5
Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024
Pages: 176 - 180Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach
Megha Manglani
Downloads: 16 | Weekly Hits: ⮙2 | Monthly Hits: ⮙5
Research Paper, Information Security, India, Volume 13 Issue 9, September 2024
Pages: 406 - 410Tracing the Impact of GDPR on Global Data Privacy
Khushal Chauhan, Mayur Ghawate, Saachi Joshi, Shrikant Kawade