Cybersecurity Risk Assessment for Infrastructure of Information Systems in Yemen Telecoms
Keywords:
Information Systems (IS), Yemen Telecoms (YT). Information Technology (IT).Abstract
This research paper focuses on conducting a comprehensive cybersecurity risk assessment for information systems (IS) and infrastructure within Yemen Telecoms (YT). The primary objective is to identify vulnerabilities, threats, and potential business impacts associated with cybersecurity risks. The research aims to prioritize risks, provide recommendations for risk mitigation, and highlight the importance of regular reassessments to adapt to a changing threat landscape.
Downloads
References
N. Abdulrahim, "Managing Cybersecurity as a Business Risk in Information Technology-based Smes," University of Nairobi, 2019.
W. Shafik, "A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations," in Effective Cybersecurity Operations for Enterprise-Wide Systems: IGI Global, 2023, pp. 56-79
https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-ICTSS-2020-4-PDF-E.pdf
F. Aferudin and K. Ramli, "The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia," Budapest International Research and Critics Institute-Journal (BIRCI-Journal), vol. 5, no. 3, pp. 22859-22872, 2022.
A. Ahmad, K. C. Desouza, S. B. Maynard, H. Naseer, and R. L. Baskerville, "How integration of cyber security management and incident response enables organizational learning," Journal of the Association for Information Science and Technology, vol. 71, no. 8, pp. 939-953, 2020.
O. M. Al-Matari, I. M. Helal, S. A. Mazen, and S. J. I. S. J. A. G. P. Elhennawy, "Integrated framework for cybersecurity auditing," vol. 30, no. 4, pp. 189-204, 2021.
B. Alhayani, S. T. Abbas, D. Z. Khutar, and H. J. Mohammed, "Best ways computation intelligent of face cyber attacks," Materials Today: Proceedings, pp. 26-31, 2021.
S. K. Alhuqail and N. S. M. Jamail, "Implementation of an Effective Framework in Merging Cybersecurity and Software Engineering," in 2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 2023: IEEE, pp. 31-36.
A. Aliyu et al., "A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom," vol. 10, no. 10, p. 3660, 2020.
I. Almomani, M. Ahmed, and L. J. P. C. S. Maglaras, "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia," vol. 7, p. e703, 2021.
M. J. A. c. J. Alshar'e, "CYBER SECURITY FRAMEWORK SELECTION: COMPARISION OF NIST AND ISO27001," pp. 245-255, 2023.
D. S. Anye, "Categorizing Cyber Threat on Critical Infrastructure: Assessing the Terrorist Threat against Cameroon's Telecommunications," Capitol Technology University, 2018.
Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, no. 6, p. 1333, 2023.
[I. Atoum, A. Otoom, and A. A. Ali, "Holistic cyber security implementation frameworks: A case study of jordan," International Journal of Information, Business and Management, vol. 9, no. 1, p. 108, 2017.
F. Baiardi and C. Telmon, "Risk management of an information infrastructure: a framework based upon security dependencies," International Journal of System of Systems Engineering, vol. 1, no. 1-2, pp. 237-256, 2008.
C. Barclay, "Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM 2)," in Proceedings of the 2014 ITU kaleidoscope academic conference: Living in a converged world-Impossible without standards?, 2014: IEEE, pp. 275-282.
I. Bashofi and M. Salman, "Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002," in 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), 2022: IEEE, pp. 58-62.
N. Belanova, "Risks of IT technology adoption," in E3S Web of Conferences, 2023, vol. 376: EDP Sciences, p. 05014.
A. Beloglazov, R. Buyya, Y. C. Lee, and A. J. A. i. c. Zomaya, "A taxonomy and survey of energy-efficient data centers and cloud computing systems," vol. 82, pp. 47-111, 2011.
K. Bezas and F. Filippidou, "Comparative analysis of open source security information & event management systems (SIEMs)," Indonesian Journal of Computer Science, vol. 12, no. 2, pp. 443-468, 2023.
M. Bitzer et al., "Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities," vol.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.