International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Information Security | Malaysia | Volume 13 Issue 8, August 2024 | Popularity: 4.9 / 10


     

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi


Abstract: Cybersecurity is a critical concern for the banking and telecom sectors, which are prime targets for cyber threats. In Bosaso, Somalia, the increase digital technologies has outpaced the implementation of effective cybersecurity measures. This study aims to evaluate the current level of cybersecurity awareness among IT professionals in Bosaso's banking and telecom sectors and to identify key vulnerabilities and threats confronting these industries. A quantitative survey was conducted, targeting IT professionals in Bosaso's banking and telecom sectors. The survey assessed participants' awareness of cybersecurity threats, their confidence in existing security measures, and their experiences with cyber incidents. Data were analyzed using descriptive statistics and thematic analysis to elucidate common themes and patterns. The survey revealed that while the majority of IT professionals are aware of common cybersecurity threats, there is a significant lack of confidence in the adequacy of current security measures. Key vulnerabilities identified include inadequate employee training, outdated software, and insufficient investment in advanced security technologies. Furthermore, 65% of respondents reported experiencing at least one cyber incident in the past year. These findings underscore the urgent need for enhanced cybersecurity practices. The study highlights the critical need for improved cybersecurity training programs, substantial investment in modern security technologies, and the implementation of comprehensive cybersecurity policies in Bosaso's banking and telecom sectors. Addressing these issues is essential for safeguarding sensitive information and ensuring the resilience of these critical infrastructure


Keywords: Cybersecurity, Bosaso, Private Sectors, Security Challenges, Threats, Awareness, IT Professionals, Data Protection, Vulnerabilities, Digital Security, Risk Management, Information Security


Edition: Volume 13 Issue 8, August 2024


Pages: 738 - 747



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi, "Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors", International Journal of Science and Research (IJSR), Volume 13 Issue 8, August 2024, pp. 738-747, https://www.ijsr.net/getabstract.php?paperid=SR24810182035

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Security, India, Volume 7 Issue 11, November 2018

Pages: 1978 - 1982

Strategic Construction and Implementation of Removable Media Policies for Mitigating Data Loss and Insider Threat Risks

Shanmugavelan Ramakrishnan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Comparative Studies, Information Security, India, Volume 12 Issue 6, June 2023

Pages: 2936 - 2951

Comparative Study between PCI-DSS v4.0 and ISO/IEC 27001:2022

Adesh Mukati, Dr. Astitwa Bhargava

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024

Pages: 176 - 180

Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach

Megha Manglani

Share this Article

Downloads: 16 | Weekly Hits: ⮙2 | Monthly Hits: ⮙5

Research Paper, Information Security, India, Volume 13 Issue 9, September 2024

Pages: 406 - 410

Tracing the Impact of GDPR on Global Data Privacy

Khushal Chauhan, Mayur Ghawate, Saachi Joshi, Shrikant Kawade

Share this Article

Downloads: 104

Research Paper, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization's Data through Penetration Testing

Prerak Doshi

Share this Article
Top