Cybersecurity as Emerging Challenge to Yemen Security
Author(s): HUMIED, Ismail A.
Author(s) keywords: Challenge, cyber-attacks, cybercrime, cybersecurity, risk
Reference keywords: cyber-attacks, cybersecurity
Abstract:
This research places the concept of cybersecurity in the context of a theoretical understanding of security and highlighting the destructive capabilities of cyber-attacks. This study examines the progress made by the country’s policy with regard to cybersecurity and provides some recommendations on how to enhance its cybersecurity.
References:
[1]. African Union, 2014. Africa Union Convention on Cyber Security and Personal Data Protection. [Online] Available at: http://www.au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection [Accessed 1 August 2022].
[2]. Austin, G., 2016. Evaluating China's Cyber Power. [Online] Available at: http://thediplomat.com/2016/10/evaluating-chinas-cyber-power/ [Accessed 27 May 2022].
[3]. Chon, G., 2015. US pursues case against Chinese army hackers. [Online] Available at: https://www.ft.com/content/a378b4c6-62b0-11e5-9846-de406ccb37f2 [Accessed 29 October 2021].
[4]. Council of Europe, 2016. Chart of signatures and ratifications of Treaty 185. [Online] Available at: http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures [Accessed 14 March 2022].
[5]. Denning, D., 1999. Information Warfare and Security. Essex: Addison-Wesley Longman Ltd. Department of Communications, 2013. Electronic Communications Act: South Africa Connect: Creating opportunity, ensuring inclusion. [Online] Available at: www.gov.za [Accessed 16 January 2022].
[6]. Estonian Ministry of Defence, 2008. Cyber Security Strategy, s.l.: Cyber Security Strategy Committee.
[7]. Grobler, M. & Jansen van Vuuren, J., 2012. Collaboration as proactive measure against cyber warfare in South Africa. African Security Review, Volume 21:2, pp. 61-73.
[8]. Grobler, M., Jansen van Vuuren, J. & Zaaiman, J., 2013. Preparing South Africa for cyber-crime and cyber defence. Systemics, cybernetics and informatics volume, p. Vol 11 No.7.
[9]. Kuehl, D., 2009. Cyberspace and Cyberpower. In: F. Kramer, S. Starr & L. Wentz, eds. Cyberpower and Security. Dulles: Potomac Books, p. 28.
[10]. Nissenbaum, H., 2005. Where computer security meets Security. Ethics and Information Security, 2(7), pp. 61-73.
[11]. Ogundeji, O., 2016. AU, China unite to tackle cybercrime. [Online] Available at: http://www.itwebafrica.com/security/513-africa/236293-au-china-unite-to-tackle-cybercrime [Accessed 2 August 2022].
[12]. Sheldon, J., 2013. The Rise of Cyberpower. In: Strategy in the contemporary world. New York: Oxford University Press, pp. 303-319.
[13]. Singer, P. & Friedman, A., 2014. Cybersecurity and Cyberwar: What everyone needs to know. New York: Oxford University Press.
[14]. US Department of Justice, 2014. U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage. [Online] Available at: http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor [Accessed 12 August 2022].
[15]. Wolfpack, 2013. 2012/2013 The South African Cyber Threat Barometer, Johannesburg: Wolfpack.
Article Title: Cybersecurity as Emerging Challenge to Yemen Security
Author(s): HUMIED, Ismail A.
Date of Publication: 2022-12-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2022.02.03
Issue: Volume 11, Issue 2, Year 2022
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 35-44 (10 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.