Downloads: 1 | Views: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Information Security | Malaysia | Volume 13 Issue 8, August 2024 | Popularity: 4.9 / 10
Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi
Abstract: Cybersecurity is a critical concern for the banking and telecom sectors, which are prime targets for cyber threats. In Bosaso, Somalia, the increase digital technologies has outpaced the implementation of effective cybersecurity measures. This study aims to evaluate the current level of cybersecurity awareness among IT professionals in Bosaso's banking and telecom sectors and to identify key vulnerabilities and threats confronting these industries. A quantitative survey was conducted, targeting IT professionals in Bosaso's banking and telecom sectors. The survey assessed participants' awareness of cybersecurity threats, their confidence in existing security measures, and their experiences with cyber incidents. Data were analyzed using descriptive statistics and thematic analysis to elucidate common themes and patterns. The survey revealed that while the majority of IT professionals are aware of common cybersecurity threats, there is a significant lack of confidence in the adequacy of current security measures. Key vulnerabilities identified include inadequate employee training, outdated software, and insufficient investment in advanced security technologies. Furthermore, 65% of respondents reported experiencing at least one cyber incident in the past year. These findings underscore the urgent need for enhanced cybersecurity practices. The study highlights the critical need for improved cybersecurity training programs, substantial investment in modern security technologies, and the implementation of comprehensive cybersecurity policies in Bosaso's banking and telecom sectors. Addressing these issues is essential for safeguarding sensitive information and ensuring the resilience of these critical infrastructure
Keywords: Cybersecurity, Bosaso, Private Sectors, Security Challenges, Threats, Awareness, IT Professionals, Data Protection, Vulnerabilities, Digital Security, Risk Management, Information Security
Edition: Volume 13 Issue 8, August 2024
Pages: 738 - 747
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Security, India, Volume 7 Issue 11, November 2018
Pages: 1978 - 1982Strategic Construction and Implementation of Removable Media Policies for Mitigating Data Loss and Insider Threat Risks
Shanmugavelan Ramakrishnan
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 13 Issue 8, August 2024
Pages: 1073 - 1078An Algorithm based on Deep Learning for Intrusion Detection in IoT
Zoya Firdouse, K. Jayasree
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Security, India, Volume 11 Issue 4, April 2022
Pages: 28 - 33Dominance of Hardware Firewalls and Denial of Firewall Attacks (Case Study BlackNurse Attack)
Thume Vamshi Krishna, Pulipati Karthik
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Security, India, Volume 13 Issue 3, March 2024
Pages: 520 - 523Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology
Dr. Ashok Kumar Yadav
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5
Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024
Pages: 176 - 180Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach
Megha Manglani