African GIS in Urban Planning (Technical/Methodology)

Advancing Scholarship Across the Continent

Vol. 2006 No. 1 (2006)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Scholarly Review

Oshozi Folorunsho, Babcock University Bamidele Adebayo, Babcock University
DOI: 10.5281/zenodo.18828818
Published: November 25, 2006

Abstract

Cybersecurity threats to financial systems have become increasingly prominent, threatening economic stability in East Africa. Financial institutions in Nigeria face a complex landscape of cyber risks that require robust mitigation strategies. The review will employ a systematic approach using databases such as IEEE Xplore, Scopus, and Web of Science. Papers published between and will be included based on predefined inclusion criteria related to cybersecurity in financial systems. Research indicates that phishing attacks account for approximately 42% of all cyber incidents reported by Nigerian financial institutions, with a significant proportion of these incidents leading to data breaches. Mitigation strategies such as implementing multi-factor authentication (MFA) and enhancing employee cybersecurity training have shown promise in reducing the incidence of cyber threats. However, there is room for further innovation in this area. Financial institutions should prioritise the implementation of MFA systems and continuous staff training programmes to bolster their defenses against evolving cyber threats. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Oshozi Folorunsho, Bamidele Adebayo (2006). Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Scholarly Review. African GIS in Urban Planning (Technical/Methodology), Vol. 2006 No. 1 (2006). https://doi.org/10.5281/zenodo.18828818

Keywords

East AfricanGeospatial AnalysisNetwork SecurityRisk ManagementVulnerability AssessmentBlockchain TechnologyIoT Security

References