African GIS Applications (Technology/Methodology)

Advancing Scholarship Across the Continent

Vol. 2008 No. 1 (2008)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies in East African Financial Systems

Hamza Ben Ali, University of Tunis El Manar Mouhammad Feki, Department of Software Engineering, University of Tunis Rachid Belhaj, Department of Data Science, University of Tunis El Manar Abdelmalek El Mili, University of Tunis El Manar
DOI: 10.5281/zenodo.18872036
Published: March 24, 2008

Abstract

Cybersecurity threats to financial systems have become increasingly prevalent globally, posing significant risks to economies and societies. In East Africa, particularly in Tunisia, these threats are compounded by a lack of robust cybersecurity frameworks. A systematic literature review was conducted using academic databases such as Scopus and Web of Science. The methodology involved analysing over 50 peer-reviewed articles published between and to identify key cybersecurity threats and their frequency in the financial sector. The analysis revealed that phishing attacks were the most common threat, accounting for approximately 45% of all identified incidents. Additionally, a lack of employee awareness training was noted as a significant vulnerability contributing to these cyber-attacks. These findings highlight the critical need for enhanced cybersecurity measures and increased employee education in financial institutions across East Africa. Financial regulatory bodies should mandate regular cybersecurity audits and implement mandatory training programmes for employees. Furthermore, collaboration between industry stakeholders is crucial for sharing best practices and resources. Cybersecurity threats, Financial systems, East Africa, Tunisia, Mitigation strategies Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Hamza Ben Ali, Mouhammad Feki, Rachid Belhaj, Abdelmalek El Mili (2008). Cybersecurity Threats and Mitigation Strategies in East African Financial Systems. African GIS Applications (Technology/Methodology), Vol. 2008 No. 1 (2008). https://doi.org/10.5281/zenodo.18872036

Keywords

Sub-SaharanAfricanizationNetworkSecurityMechanisticModelsLatticeTheoryBlockchainTechnologiesVulnerabilityAssessment

References