Cybersecurity Risk Assessment for Infrastructure of Information Systems in Yemen Telecoms

Authors

  • Abdulkarem Yahya Abohatem, Fadl Mutaher Ba-Alwi, Mona Ahmed Mohammed Al-Haifi, Hana Hasan Al-hadheri

Keywords:

Information Systems (IS), Yemen Telecoms (YT). Information Technology (IT).

Abstract

This research paper focuses on conducting a comprehensive cybersecurity risk assessment for information systems (IS) and infrastructure within Yemen Telecoms (YT). The primary objective is to identify vulnerabilities, threats, and potential business impacts associated with cybersecurity risks. The research aims to prioritize risks, provide recommendations for risk mitigation, and highlight the importance of regular reassessments to adapt to a changing threat landscape.

Downloads

Download data is not yet available.

References

N. Abdulrahim, "Managing Cybersecurity as a Business Risk in Information Technology-based Smes," University of Nairobi, 2019.

W. Shafik, "A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations," in Effective Cybersecurity Operations for Enterprise-Wide Systems: IGI Global, 2023, pp. 56-79

https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-ICTSS-2020-4-PDF-E.pdf

F. Aferudin and K. Ramli, "The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia," Budapest International Research and Critics Institute-Journal (BIRCI-Journal), vol. 5, no. 3, pp. 22859-22872, 2022.

A. Ahmad, K. C. Desouza, S. B. Maynard, H. Naseer, and R. L. Baskerville, "How integration of cyber security management and incident response enables organizational learning," Journal of the Association for Information Science and Technology, vol. 71, no. 8, pp. 939-953, 2020.

O. M. Al-Matari, I. M. Helal, S. A. Mazen, and S. J. I. S. J. A. G. P. Elhennawy, "Integrated framework for cybersecurity auditing," vol. 30, no. 4, pp. 189-204, 2021.

B. Alhayani, S. T. Abbas, D. Z. Khutar, and H. J. Mohammed, "Best ways computation intelligent of face cyber attacks," Materials Today: Proceedings, pp. 26-31, 2021.

S. K. Alhuqail and N. S. M. Jamail, "Implementation of an Effective Framework in Merging Cybersecurity and Software Engineering," in 2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 2023: IEEE, pp. 31-36.

A. Aliyu et al., "A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom," vol. 10, no. 10, p. 3660, 2020.

I. Almomani, M. Ahmed, and L. J. P. C. S. Maglaras, "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia," vol. 7, p. e703, 2021.

M. J. A. c. J. Alshar'e, "CYBER SECURITY FRAMEWORK SELECTION: COMPARISION OF NIST AND ISO27001," pp. 245-255, 2023.

D. S. Anye, "Categorizing Cyber Threat on Critical Infrastructure: Assessing the Terrorist Threat against Cameroon's Telecommunications," Capitol Technology University, 2018.

Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, no. 6, p. 1333, 2023.

[I. Atoum, A. Otoom, and A. A. Ali, "Holistic cyber security implementation frameworks: A case study of jordan," International Journal of Information, Business and Management, vol. 9, no. 1, p. 108, 2017.

F. Baiardi and C. Telmon, "Risk management of an information infrastructure: a framework based upon security dependencies," International Journal of System of Systems Engineering, vol. 1, no. 1-2, pp. 237-256, 2008.

C. Barclay, "Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM 2)," in Proceedings of the 2014 ITU kaleidoscope academic conference: Living in a converged world-Impossible without standards?, 2014: IEEE, pp. 275-282.

I. Bashofi and M. Salman, "Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002," in 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), 2022: IEEE, pp. 58-62.

N. Belanova, "Risks of IT technology adoption," in E3S Web of Conferences, 2023, vol. 376: EDP Sciences, p. 05014.

A. Beloglazov, R. Buyya, Y. C. Lee, and A. J. A. i. c. Zomaya, "A taxonomy and survey of energy-efficient data centers and cloud computing systems," vol. 82, pp. 47-111, 2011.

K. Bezas and F. Filippidou, "Comparative analysis of open source security information & event management systems (SIEMs)," Indonesian Journal of Computer Science, vol. 12, no. 2, pp. 443-468, 2023.

M. Bitzer et al., "Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities," vol.

Downloads

Published

02.05.2024

How to Cite

Abdulkarem Yahya Abohatem. (2024). Cybersecurity Risk Assessment for Infrastructure of Information Systems in Yemen Telecoms. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 2791–2798. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5903

Issue

Section

Research Article