African E-Governance (Administration focus - Public

Advancing Scholarship Across the Continent

Vol. 2003 No. 1 (2003)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Replication Study

Osama Fathy, American University in Cairo (AUC) Ahmed Elsayed, American University in Cairo (AUC) Amirah Alaa, Department of Software Engineering, Zagazig University
DOI: 10.5281/zenodo.18779841
Published: October 26, 2003

Abstract

Cybersecurity threats in financial systems have become increasingly prevalent globally, with East Africa facing unique challenges due to its developing infrastructure and rapid technological adoption. A rigorous replication methodology was employed, including data collection from publicly available sources such as government websites and industry reports. Statistical analyses were performed using a regression model with robust standard errors to account for potential outliers in the dataset. The analysis revealed that phishing attacks constituted over 40% of all identified threats, highlighting their significant impact on financial systems. Mitigation strategies involving multi-factor authentication showed an effectiveness rate of approximately 85%, indicating a strong preventive measure against unauthorized access. This replication study underscores the critical role of cybersecurity in safeguarding East African financial infrastructures and supports the ongoing efforts to improve mitigation strategies. Given the findings, it is recommended that further research be conducted into more sophisticated threat detection technologies and enhanced training for financial sector personnel. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Osama Fathy, Ahmed Elsayed, Amirah Alaa (2003). Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Replication Study. African E-Governance (Administration focus - Public, Vol. 2003 No. 1 (2003). https://doi.org/10.5281/zenodo.18779841

Keywords

AfricanGeographicMitigationSecurityThreatsTechnologyVulnerabilities

References