African Robotics and Autonomous Systems

Advancing Scholarship Across the Continent

Vol. 2000 No. 1 (2000)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa: A Methodological Approach

Fikile Ngcobo, Department of Data Science, Wits Business School Nomsa Dlamini, Department of Artificial Intelligence, Human Sciences Research Council (HSRC) Mpho Sekhoto, Department of Software Engineering, University of Limpopo Sipho Motshega, University of Limpopo
DOI: 10.5281/zenodo.18715732
Published: July 14, 2000

Abstract

Financial systems in East Africa are increasingly interconnected through digital platforms, exposing them to cyber threats such as malware and phishing attacks. A systematic review approach was employed to analyse threat vectors, vulnerabilities, and potential countermeasures. A Bayesian hierarchical model was used to estimate the likelihood of cyber attacks across different sectors with 95% credible intervals. The analysis revealed that malware targeting financial software accounts for approximately 40% of all detected threats in South African institutions. This study underscores the importance of proactive cybersecurity measures and highlights the effectiveness of a Bayesian hierarchical model in assessing cyber risks across sectors. Financial institutions should implement regular security audits, employee training programmes, and use advanced encryption technologies to mitigate identified cyber threats. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Fikile Ngcobo, Nomsa Dlamini, Mpho Sekhoto, Sipho Motshega (2000). Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa: A Methodological Approach. African Robotics and Autonomous Systems, Vol. 2000 No. 1 (2000). https://doi.org/10.5281/zenodo.18715732

Keywords

Sub-SaharanMalware AnalysisPhishing DetectionBlockchain SecurityAnomaly DetectionRisk AssessmentSupply Chain Security

References