Paper 11
Paper 11
www.matjournals.com
www.matjournals.com
cybersecurity and privacy theory. The continued of the key sources used in this article. The
harm done by Chinese hackers in the United second research method investigates some of the
States attests to this (Chon, 2015). This example most terrible cyber-attacks in the world through
will highlight the destructive power of cyber- an analytical and descriptive research strategy.
attacks, the impact they can have on a nation's The importance of cybersecurity to Yemen's
critical infrastructure in the public sector, the security will be highlighted through a desk study
consequences of economic destruction in the and an example of a cyber-attack. Secondary
private sector, and the challenges governments sources of cybersecurity information would be
face in defending against such attacks [7]. articles, research papers, novels, and news
A survey of cyber weapons and how websites; statistical reporting; and technology-
states create advanced software capabilities to oriented communication.
wage war at the touch of a button was sparked This study will attempt to show that
by this case. These multinational attacks have within the security framework of Yemen,
highlighted Yemen's cybersecurity needs. Given concerns about cyber-attacks need to be taken
the objectives of the country's National much more seriously than has been achieved so
Development Plan regarding the development of far by primary and secondary literature reviews.
ICT and infrastructure, the threat of such attacks Hacker attacks on the financial sector are
should be taken seriously. expected to be costly in the future and will
This analysis provides a comprehensive hinder the growth of the economy. Threats to
overview of the key developments that Yemen's critical infrastructure are likely to become more
cyber environment can predict as the country common, and cyber weapons proliferation has
develops. It also indicates the possibility of and is happening as nations around the world use
multiple attacks on the Internet (Wolfpack, the internet to get to know each other and even
2013) [8]. The nation is defensive as a to spy on their activities. Yemen's public and
developing country. As is often the case in private sectors acknowledge the value of
developing countries, establishing ICT increasing cybersecurity, but in practice little is
infrastructure is the priority, and ensuring known.
protection from cyber-attacks is a distant
afterthought. As stated in the introduction, the YEMEN'S DOMESTIC CYBERSECURITY
cited sources will provide a basic context for the PROGRESS
growing importance of cybersecurity in Yemen.
However, the literature assessing the current The internet service was launched in the
state of cybersecurity in Yemen and the Republic of Yemen in the Year 1996, and with
country's general application of cybersecurity is the integration of technology into the daily
still in its infancy. In this regard, this research routine of communication and applications for
aims to contribute to a more integrated analysis smartphones, online shopping, and network-
of how cybersecurity affects Yemeni security. connected devices, these uses are no longer for
After the introduction, the research the sake of entertainment or luxury, but rather
methodology was mentioned. In the third part of have become an integral part of daily life The
this research, Yemen’s domestic cybersecurity service has witnessed rapid growth in the
progress was described. In the fourth part, cyber number of users over the past five years.
security developments in the rest of the world Internet users in the Republic of Yemen
were presented. Finally, parts 5 and 6 contain reached more than ten million users by the end
conclusions and recommendations. of 2021, with a growth rate of 18% over the
Year 2020, and this represents 33% of the total
RESEARCH METHODOLOGY population of the Republic of Yemen, which
numbered more than thirty million until the end
Through an exploratory study using a of the Year 2021.
qualitative research strategy that combines two As a result of the transition of our
research techniques, it is possible to understand country to the use of 4G technologies for
how cybersecurity is a new threat to Yemen's communications and Internet services and the
security. Research the literature first. The general trend towards electronic government and
National Cybersecurity Policy Framework, digital transformation of services, the number of
Cybercrime, and the Cybersecurity Bill are some Internet users and modern technologies are
www.matjournals.com
expected to increase, which requires the files, and the information extracted from the
necessity of preparing a national strategy for digital analysis is 192,500 files.
cyber security that contributes to raising Statistical Study for the Year 2021: The
awareness of risks and threats and informing number of files flowing in the digital
users of methods that ensure preserve and analysis stage is more than 217,669,212
protect their data and ensure privacy, in addition files, and the information extracted from the
to taking the necessary measures that work to digital analysis is 58,400 files.
achieve early prevention of such crimes, as well It is also noted from table 1 that the
as building and raising the capabilities of number of accused arrested by the CID
national cadres in this field, and providing the outperforms the other authorities, and this is
necessary means to protect the national because most victims of cybersecurity crimes do
information infrastructure, in addition to creating not report their exposure to a cyber-attack to the
a flexible legislative system that keeps pace with concerned authorities. Rather than that, the
the developments and changes accelerating in security men of the CID discovered the crime.
this area [9]. It is also noted that the number of
The emergence of cybercrimes in devices used to commit crimes is greater than
Yemen has begun to spread dangerously, which the number of accused, and this means that the
poses a challenge to the security authorities, who accused has more than one device and has
have been preoccupied with pursuing traditional experience in committing crimes. In addition to
crimes during the past years. The criminal that, cybercrimes traditional crimes such as
investigation department (CID) conducted a murder, forgery, traditional crimes such as
statistical study on the most important seizure murder, forgery, theft, kidnapping, and suicide
and sending agencies in Sana'a city and the are more than pure cybercrimes such as
number of accused, seized devices, pure defamation of the victim and the transfer of
cybercrimes, as well as cybercrimes with funds through accounts in banks, and this is
traditional crimes, for each of them, showing the because such recent crimes are usually not
volume of data flowing in some of the seized discovered either because their harm is not
crimes during the previous five Years (2017– apparent or because the victim has waived his
2021), where all types of digital files were dealt right to report them for fear of scandal or
with (text, audio, images, video, executive, tarnishing his reputation.
encrypted, other files) Table 1 is a summary of Table 1 shows that other security
this statistical study, which is explained in the agencies were not concerned with this type of
following: crime in the Year 2017, despite its seriousness. It
Statistical Study for the Year 2017: The also shows that these authorities began reporting
number of files flowing in the digital crimes in the Year 2018, and the number
analysis stage is more than 136,488,352 increased in 2019, but the number began to
files, and the information extracted from the decline in the Year 2020 until it was absent in
digital analysis is 11,768 files. Table 1: A 2021 for several reasons, including the lack of
statistical study for cybercrimes from 2017 specialists in this field, as well as the security
to 2021. and economic situation in the country due to the
Statistical Study for the Year 2018: The war that began on March 26, 2015.
number of files flowing through the digital Fig. 1 shows a discrepancy in the total
analysis stage is more than 96,468,000 files, number of cybercrimes in each of the seizure
and the information extracted from the and sending agencies for the past five years, and
digital analysis is 112,500 files. this confirms that other factors constitute an
Statistical Study for the Year 2019: The obstacle for security men in detecting
number of files flowing in the digital cybercrime and knowing its perpetrators. In this
analysis stage is more than 407,224,000 figure, the logarithm of the total number of
files, and the information extracted from the cybercrimes is calculated to allow small
digital analysis is 126,202 files. numbers to appear. However, the total number of
Statistical Study for the Year 2020: The crimes committed in each year is not small for
number of files flowing in the digital the limits of the study, and this is certainly
analysis stage is more than 242,500,000 nothing compared to the actual crimes
committed in those years.
www.matjournals.com
In 2020, the Yemen government released the The bill has not been without criticism.
cybercrimes and cybersecurity bill for public Since its release, it has come under intense
comment. The bill provides a basis to ensure that scrutiny as the media and citizens have
the government tackles various elements relating expressed concern about how the proposed
to the country's cyber security. The bill's initial legislation encroaches on privacy rights. The law
synopsis states the following: regulating crimes has also been criticized for trying to extend
and imposing penalties that impact cybercrime, cyber operations to other government agencies.
regulating the jurisdiction of the courts; further Although the Ministry of Home Affairs is
regulating the powers of investigation; search, primarily responsible for the cybersecurity law.
access, or seizure; and regulating aspects of To eliminate inefficiencies, the law needs to
international cooperation in the investigation of clarify the role of each agency if it is to function
cybercrime. effectively.
www.matjournals.com
Figure 1: The total number of cybercrimes in each of the seizure and sending agencies for the past
five years.
www.matjournals.com
about sovereignty, major world powers such as will be responsible for law enforcement and
China and Russia have refused to ratify the provides information on how cybersecurity laws
treaty and have tried to work directly with the and regulatory frameworks should be created.
UN to develop a code of conduct for the Improving cooperation in cyberspace also
Internet. Sovereignty and enforcement will requires the drafting of mutual legal assistance
likely continue [11]. and information-sharing agreements. With low
It is not necessary to sign international voter turnout, Yemen has an opportunity to
agreements to promote cybersecurity. For establish itself as a major player in cyberspace
example, China continues to pursue [15, 16].
cybersecurity cooperation with various partners The International Telecommunication
despite its inability to enter into agreements. Union (ITU) has created the Global
Chinese companies are pursuing multifaceted Cybersecurity Index (GCI) to gauge the
cooperation initiatives with African countries in commitment of countries to cybersecurity. The
the fields of internet development and federation developed this index to raise
governance as part of their commitment to work awareness of the importance and aspects of
with the African Union (AU) to increase and various issues in raising the level of
strengthen cybersecurity on the African cybersecurity and to promote to exchange of
continent (Ogundeji, 2016). Chinese President experiences and sharing of experiences among
Xi Jinping said in February 2014 that he would countries. This indicator was created to
do everything in his power to ensure that China determine the maturity of Member States in
becomes a cyber-superpower by improving cybersecurity according to specific standards and
scientific and technological progress in the is measured every two years. The index is based
country (Austin, 2016) [12-14]. on ranking countries out of 100 on five main
Strengthening cross-border cooperation axes (legal, technical, regulatory, awareness,
in the area of cyber defense is key to preventing capacity building, and cooperation) by analyzing
global cyber-attacks. Due to its globalization, the the performance of countries in 80 sub-
network environment cannot be approached only indicators. They meet as one standard measure
from a national or regional point of view. to monitor the cybersecurity commitment of the
Critical national infrastructure, such as electric member states of the International
utilities, can exist in several countries and even Telecommunication Union (ITU). The closer the
cross international borders. Companies that country's index gets to the correct one, the
manage critical infrastructure in the country may stronger the country's commitment to its
be foreign-owned and networked. cybersecurity is. The smaller the index, the less
Grobler and Van Vuuren disagree (2012: this indicates a weak commitment to the pillars
sixty-four). Yemen's well-developed ICT of its cyber security, and the ranking of Arab
infrastructure puts it in a favorable position to countries varies on the cyber security index, as
dominate in matters related to cybersecurity. The some countries come in advanced ranks and
Draft National Cybersecurity Strategy was most of them are in lagging ranks, where Yemen
created in April 2022. The document provides an comes in the last ranks in those indicators
in-depth explanation of how to create a strong according to the periodic reports of the cyber
information-based society. It outlines the security index shown in Table 2 [17].
responsibilities of the national authorities that
Table 2: The global cybersecurity index (GCI) issued by the international telecommunication union
(ITU).
Year Arabic Ranking World Ranking Index
2015* 14/13 29/27 0.059
2017 22 164 0.007
2018 21 172 0.019
2020** 22 182 0.000
www.matjournals.com
This is due to the following reasons: borders. Yemen needs a clear focus on
The absence of a national strategy for cyber cybersecurity as the idea of human security has a
security. significant impact on the security of the country.
The absence of legal legislation regulating There is still a lack of engagement and
cyber security and governing cybercrime. communication about the importance of
The absence of national entities concerned cybersecurity to security, although the state has
with cyber security. developed cyber policy frameworks to guide the
The shortage of expertise and specialized development of more targeted laws. Even the
cadres in cybersecurity. national vision of building a modern Yemeni
Low level of awareness of users' protection state fails to articulate any clear strategy
procedures. regarding cybersecurity. We highlight one of the
Weak coordination, cooperation, and recurring themes of this study:
exchange of experience and information Yemen has failed to appreciate the
between the various sectors in the Republic. importance and attention of cybersecurity in its
Weak coordination and cooperation with policies. This may have been the case because
the relevant international agencies. the authorities miscalculated the potential harm
Implementation of cybersecurity by the world's that cyber-attacks could do to the country. This
leading countries but also for Yemen would also explain why the government has yet
to make available studies to examine the
specifically, will be a key mechanism that can be
used to strengthen the cyber position of the country's cybersecurity.
country. One of the areas where the state can The Cybersecurity and Cybercrime Bill
that the Yemeni government is in the process of
strengthen its position is by sharing information
drafting focuses on laws related to the internet,
and building alliances between the military,
but it is not enough to solve the problems facing
police, and state security. Another tactic to
ensure cybersecurity issues get the attention they Yemen. Public sector capacity building is
deserve is appointing a president who is in important, focusing on technical competencies
such as cybercrime, cryptography, information
charge of cyber resources. Furthermore, it will
security, and other related electronics. One of the
ensure that the government is aware of new
problems facing the country due to the lack of
cyber threats and trends and bring the country in
line with international standards [9]. expertise by the Yemeni police in cyber
operations is the inability to conduct proper
cyber investigations. The Cybercrime and
CONCLUSION
Cybercrime Bill will improve prosecution
This study examined current guidelines, but it needs to be supported by
effective skills development within the country's
cybersecurity issues affecting the security of
Yemen. Besides providing a review of many police force. The military and government
common cyber-attacks, this study also evaluates intelligence services operate in the same way.
ideas about cybersecurity. Finally, this study Better cooperation with the commercial
presented data on the current state of sector and research institutions can help in this
cybersecurity in Yemen and concluded with process. Lack of information sharing about
some recommendations to improve Yemen's cyber-attacks is another problem the country is
facing, especially in the corporate sector, where
cybersecurity in the future.
companies are reluctant to disclose their security
vulnerabilities. To understand a holistic
RECOMMENDATIONS
approach to cybersecurity better, governments
Cybersecurity is an issue for Yemen's need to proactively engage with organizations
that frequently experience cyber-attacks, such as
security and will continue to become more
banks and financial institutions. On the research
important. Terrorist groups like ISIS are
front, the government not only needs to develop
increasingly using the Internet to achieve their
goals. ISIS can use the Internet in Yemen to more focused cyber research but also needs to
recruit new agents and can incite locals to empower organizations like the CSIR’s Center
engage in terrorist activity within the country's for Cyber Security with the resources to help
develop cybersecurity solutions.
www.matjournals.com
www.matjournals.com