Vol. 2010 No. 1 (2010)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: An Eritrean Perspective

Asgedeos Bekele, Department of Data Science, University of Asmara (currently closed/reorganized) Zerihun Mengisteab, Department of Data Science, University of Asmara (currently closed/reorganized) Tesfaye Ayalew, Department of Software Engineering, University of Asmara (currently closed/reorganized) Yonas Gebreab, University of Asmara (currently closed/reorganized)
DOI: 10.5281/zenodo.18907425
Published: April 21, 2010

Abstract

Cybersecurity threats in financial systems are increasingly recognised as critical issues, especially in East Africa where technological advancements often outpace regulatory measures. A mixed-methods approach was employed, combining a structured questionnaire survey with qualitative interviews among key stakeholders in the Eritrean banking sector. The analysis revealed that Eritrea's financial sector is particularly vulnerable to phishing attacks (45%) and ransomware threats (32%), which are common cybercrimes targeting such sectors globally. Mitigation strategies should focus on improving employee cybersecurity awareness, enhancing data encryption practices, and establishing more robust incident response protocols. Financial institutions in Eritrea should prioritise investing in advanced security technologies and continuously update their cybersecurity policies to align with international best practices. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

Full Text:

Read the Full Article

The HTML galley is loaded below for inline reading and better discovery.

How to Cite

Asgedeos Bekele, Zerihun Mengisteab, Tesfaye Ayalew, Yonas Gebreab (2010). Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: An Eritrean Perspective. African Spatial Planning (Technical/GIS aspects), Vol. 2010 No. 1 (2010). https://doi.org/10.5281/zenodo.18907425

Keywords

Sub-SaharanAfricanizationNetworkSecurityDataPrivacyBlockchainTechnologySecureProtocolsAnomalyDetection

Research Snapshot

Desktop reading view
Language
EN
Formats
HTML + PDF
Publication Track
Vol. 2010 No. 1 (2010)
Current Journal
African Spatial Planning (Technical/GIS aspects)

References