0% found this document useful (0 votes)
8 views9 pages

Paper 11

Uploaded by

Ismail Humied
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views9 pages

Paper 11

Uploaded by

Ismail Humied
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Journal of e-ISSN: 2583-4703

Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

Cybersecurity As an Emerging Challenge to Yemen Security


Ismail. A. Humied*
Associate Professor, Faculty of Police, Policy Academic, Ministry of Interior, Sana'a, Yemen
*
Corresponding Author: dr.ismail_humied@yahoo.com

ABSTRACT new words and phrases into our modern


Yemen is a developing country, but it is lexicography. In Strategy for the Contemporary
making progress in terms of technology due World (2013), John Sheldon studies the history
to the development of ICT and the expansion of the word "cyber", first used in 1982, to help
of the national infrastructure. As a result of decipher ICT jargon. The term "cyberspace" was
this expansion, the availability of Internet first used, according to Sheldon (2013), in 1982,
connectivity is becoming more and more but the concept dates back to 1968 and the
popular among people. However, the Advanced Research Projects Agency Network
emergence of cybersecurity as a new security (ARPANET) (Singer) & Friedman, 2014). There
threat in Yemen is a result of these advances. is no widely accepted title for cyberspace, while
This report examines Yemen's security issues some, such as Dorothy Denning (1999), argue
regarding cybersecurity. This study places the that it is best described as "the total of all
idea of cybersecurity within the framework of computer networks". To fully understand the
security theory. The paper reveals Chinese word, this study will look at this definition as
hackers targeting the United States and well as other definitions, including those given
highlights the devastating potential of cyber- by Daniel Kuehl (2009) and the US Department
attacks. Based on this, we can then assess of Defence (2013) [1-5].
Yemen's cybersecurity environment. The The idea of electronic force is also
survey also includes other statistical surveys discussed by Sheldon (2013) about other
that list the country as one of the hardest-hit military domains including land, air, and naval
countries in the world. Yemen acknowledged power, and he notes that the electronic
the need for ICT for growth but ignored the environment is to the military's advantage attack.
importance of cybersecurity. The study looks Defense, he argues, can only mitigate the worst
at the development of the country's effects, not completely prevent attacks. This
cybersecurity strategy, which led to the draft particular feature of network power requires a
detailed deconstruction of the exact meaning of
Cybersecurity and IT Crime Prevention Act,
"cybersecurity". This will be essential in guiding
which will be published in 2022. Discussions
the conversation about the concept of
on a national cybersecurity strategy have also cybersecurity and how it can be viewed in the
been launched by him in 2022, but so far, no three distinct cyber domains identified by Helen
concrete cyber laws have been enacted. The Nissenbaum (2005). Several factors accompany
country is poorly positioned online due to a the expression of cyber security when
lack of cyber skills and expertise. The study determining its origin, such as the types of risks
also makes some suggestions on how Yemen that exist in the cybernetic field. (e.g., computer
can improve its overall cybersecurity viruses) [1, 6].
strategy. Derek Riveron's writing (2012) provides
a solid foundation that captures many dangers,
Keywords- Challenge, Cyber-attacks, as the work of B. Singer and Alan Friedman
Cybercrime, Cybersecurity, Risk, Security (2014) did. The distinction between cyber-
attacks launched by criminals or hackers against
states and government-launched cyber-attacks
INTRODUCTION against states will be important in this debate,
which will also explore cyber-attacks aimed at
To understand this increasing level of people or companies to make money [2].
connectivity, the World Wide Web and the His research will then use an example to
Internet have forced the introduction of many explore the nature of cyber threats further,
building on a fully written summary of current

15 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

cybersecurity and privacy theory. The continued of the key sources used in this article. The
harm done by Chinese hackers in the United second research method investigates some of the
States attests to this (Chon, 2015). This example most terrible cyber-attacks in the world through
will highlight the destructive power of cyber- an analytical and descriptive research strategy.
attacks, the impact they can have on a nation's The importance of cybersecurity to Yemen's
critical infrastructure in the public sector, the security will be highlighted through a desk study
consequences of economic destruction in the and an example of a cyber-attack. Secondary
private sector, and the challenges governments sources of cybersecurity information would be
face in defending against such attacks [7]. articles, research papers, novels, and news
A survey of cyber weapons and how websites; statistical reporting; and technology-
states create advanced software capabilities to oriented communication.
wage war at the touch of a button was sparked This study will attempt to show that
by this case. These multinational attacks have within the security framework of Yemen,
highlighted Yemen's cybersecurity needs. Given concerns about cyber-attacks need to be taken
the objectives of the country's National much more seriously than has been achieved so
Development Plan regarding the development of far by primary and secondary literature reviews.
ICT and infrastructure, the threat of such attacks Hacker attacks on the financial sector are
should be taken seriously. expected to be costly in the future and will
This analysis provides a comprehensive hinder the growth of the economy. Threats to
overview of the key developments that Yemen's critical infrastructure are likely to become more
cyber environment can predict as the country common, and cyber weapons proliferation has
develops. It also indicates the possibility of and is happening as nations around the world use
multiple attacks on the Internet (Wolfpack, the internet to get to know each other and even
2013) [8]. The nation is defensive as a to spy on their activities. Yemen's public and
developing country. As is often the case in private sectors acknowledge the value of
developing countries, establishing ICT increasing cybersecurity, but in practice little is
infrastructure is the priority, and ensuring known.
protection from cyber-attacks is a distant
afterthought. As stated in the introduction, the YEMEN'S DOMESTIC CYBERSECURITY
cited sources will provide a basic context for the PROGRESS
growing importance of cybersecurity in Yemen.
However, the literature assessing the current The internet service was launched in the
state of cybersecurity in Yemen and the Republic of Yemen in the Year 1996, and with
country's general application of cybersecurity is the integration of technology into the daily
still in its infancy. In this regard, this research routine of communication and applications for
aims to contribute to a more integrated analysis smartphones, online shopping, and network-
of how cybersecurity affects Yemeni security. connected devices, these uses are no longer for
After the introduction, the research the sake of entertainment or luxury, but rather
methodology was mentioned. In the third part of have become an integral part of daily life The
this research, Yemen’s domestic cybersecurity service has witnessed rapid growth in the
progress was described. In the fourth part, cyber number of users over the past five years.
security developments in the rest of the world Internet users in the Republic of Yemen
were presented. Finally, parts 5 and 6 contain reached more than ten million users by the end
conclusions and recommendations. of 2021, with a growth rate of 18% over the
Year 2020, and this represents 33% of the total
RESEARCH METHODOLOGY population of the Republic of Yemen, which
numbered more than thirty million until the end
Through an exploratory study using a of the Year 2021.
qualitative research strategy that combines two As a result of the transition of our
research techniques, it is possible to understand country to the use of 4G technologies for
how cybersecurity is a new threat to Yemen's communications and Internet services and the
security. Research the literature first. The general trend towards electronic government and
National Cybersecurity Policy Framework, digital transformation of services, the number of
Cybercrime, and the Cybersecurity Bill are some Internet users and modern technologies are

16 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

expected to increase, which requires the files, and the information extracted from the
necessity of preparing a national strategy for digital analysis is 192,500 files.
cyber security that contributes to raising  Statistical Study for the Year 2021: The
awareness of risks and threats and informing number of files flowing in the digital
users of methods that ensure preserve and analysis stage is more than 217,669,212
protect their data and ensure privacy, in addition files, and the information extracted from the
to taking the necessary measures that work to digital analysis is 58,400 files.
achieve early prevention of such crimes, as well It is also noted from table 1 that the
as building and raising the capabilities of number of accused arrested by the CID
national cadres in this field, and providing the outperforms the other authorities, and this is
necessary means to protect the national because most victims of cybersecurity crimes do
information infrastructure, in addition to creating not report their exposure to a cyber-attack to the
a flexible legislative system that keeps pace with concerned authorities. Rather than that, the
the developments and changes accelerating in security men of the CID discovered the crime.
this area [9]. It is also noted that the number of
The emergence of cybercrimes in devices used to commit crimes is greater than
Yemen has begun to spread dangerously, which the number of accused, and this means that the
poses a challenge to the security authorities, who accused has more than one device and has
have been preoccupied with pursuing traditional experience in committing crimes. In addition to
crimes during the past years. The criminal that, cybercrimes traditional crimes such as
investigation department (CID) conducted a murder, forgery, traditional crimes such as
statistical study on the most important seizure murder, forgery, theft, kidnapping, and suicide
and sending agencies in Sana'a city and the are more than pure cybercrimes such as
number of accused, seized devices, pure defamation of the victim and the transfer of
cybercrimes, as well as cybercrimes with funds through accounts in banks, and this is
traditional crimes, for each of them, showing the because such recent crimes are usually not
volume of data flowing in some of the seized discovered either because their harm is not
crimes during the previous five Years (2017– apparent or because the victim has waived his
2021), where all types of digital files were dealt right to report them for fear of scandal or
with (text, audio, images, video, executive, tarnishing his reputation.
encrypted, other files) Table 1 is a summary of Table 1 shows that other security
this statistical study, which is explained in the agencies were not concerned with this type of
following: crime in the Year 2017, despite its seriousness. It
 Statistical Study for the Year 2017: The also shows that these authorities began reporting
number of files flowing in the digital crimes in the Year 2018, and the number
analysis stage is more than 136,488,352 increased in 2019, but the number began to
files, and the information extracted from the decline in the Year 2020 until it was absent in
digital analysis is 11,768 files. Table 1: A 2021 for several reasons, including the lack of
statistical study for cybercrimes from 2017 specialists in this field, as well as the security
to 2021. and economic situation in the country due to the
 Statistical Study for the Year 2018: The war that began on March 26, 2015.
number of files flowing through the digital Fig. 1 shows a discrepancy in the total
analysis stage is more than 96,468,000 files, number of cybercrimes in each of the seizure
and the information extracted from the and sending agencies for the past five years, and
digital analysis is 112,500 files. this confirms that other factors constitute an
 Statistical Study for the Year 2019: The obstacle for security men in detecting
number of files flowing in the digital cybercrime and knowing its perpetrators. In this
analysis stage is more than 407,224,000 figure, the logarithm of the total number of
files, and the information extracted from the cybercrimes is calculated to allow small
digital analysis is 126,202 files. numbers to appear. However, the total number of
 Statistical Study for the Year 2020: The crimes committed in each year is not small for
number of files flowing in the digital the limits of the study, and this is certainly
analysis stage is more than 242,500,000 nothing compared to the actual crimes
committed in those years.

17 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

Table 1: Statistical study for the year 2021.


Seizure and Number of Pure
Number of Cybercrimes With
Year Sending Seized Cyber
Accused Traditional Crimes
Agencies Devices Crimes
CID 1863 2984 92 1771
Courts and
187 415 16 171
prosecutions
2017
Sent from police
212 768 65 147
stations
Total 2262 4167 173 2089
CID 1696 2984 172 1497
Courts and
218 608 52 556
prosecutions
Sent from police
2018 482 1006 112 370
stations
Other security
31 46 9 22
agencies
Total 2427 4644 345 2445
CID 1779 6132 262 1517
Courts and
164 218 22 142
prosecutions
Sent from police
2019 268 436 29 239
stations
Other security
47 126 13 34
agencies
Total 2258 6912 326 1932
CID 1912 3684 118 396
Courts and
135 331 11 124
prosecutions
Sent from police
2020 502 1312 82 202
stations
Other security
17 32 - 17
agencies
Total 2566 5359 211 739
CID 1618 7018 456 1162
Courts and
412 632 18 394
prosecutions
2021
Sent from police
386 853 142 244
stations
Total 2416 8503 616 1800

In 2020, the Yemen government released the The bill has not been without criticism.
cybercrimes and cybersecurity bill for public Since its release, it has come under intense
comment. The bill provides a basis to ensure that scrutiny as the media and citizens have
the government tackles various elements relating expressed concern about how the proposed
to the country's cyber security. The bill's initial legislation encroaches on privacy rights. The law
synopsis states the following: regulating crimes has also been criticized for trying to extend
and imposing penalties that impact cybercrime, cyber operations to other government agencies.
regulating the jurisdiction of the courts; further Although the Ministry of Home Affairs is
regulating the powers of investigation; search, primarily responsible for the cybersecurity law.
access, or seizure; and regulating aspects of To eliminate inefficiencies, the law needs to
international cooperation in the investigation of clarify the role of each agency if it is to function
cybercrime. effectively.

18 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

Figure 1: The total number of cybercrimes in each of the seizure and sending agencies for the past
five years.

There are no cybersecurity laws in the individuals with a strong IT technical


country that address compliance and regulatory background in cybersecurity is another.
issues. From a regulatory point of view, the
country needs to establish stricter compliance CYBER SECURITY DEVELOPMENTS IN
laws and regulations, including provisions for THE REST OF THE WORLD
data protection, breach reporting, and
certification/standardization standards. This is A state planner could benefit from
especially important for commercial sectors with studying examples of cybersecurity initiatives
critical national infrastructure, such as banks and from other countries. The internet and
financial institutions. These are sectors where technological advancements are advancing much
customers are often at risk. Legislation is needed faster than the state's ability to enact legislation,
to ensure organizations, like banks, take making it difficult to launch initiatives in
precautions to prevent data breaches. To do this, cyberspace. A certain cybersecurity initiative
regulations governing the use of passwords, data may be outdated by the time the government
encryption, anti-virus software, and intrusion announces it. Effective cybersecurity requires a
detection and prevention systems must be comprehensive strategy that incorporates
continually reviewed. The Cybercrime and national and international laws applicable to the
Cybersecurity Bill, if passed, would help in a cyber environment. Since cyber dangers
few ways, but it gives no indication of which frequently cross borders, countries often struggle
specific economic sectors are at risk. The to pass meaningful legislation by acting alone.
measure is under public scrutiny, but it has been This presents a problem as there are no
criticized over privacy issues and the authority it universally accepted treaties to be enforced on
grants the state. The country often makes cyber security (Grobler, et al., 2013: 32-37) [10].
mediocre progress in cybersecurity. The The Cybercrime Convention, signed in
Cybersecurity and Cybercrime Bill 2020 has November 2001 and entered into force in July
been put up for public debate as a simple step in 2004, is the first international convention on
the drafting process to better manage the cybersecurity. Only 49 countries, mostly in
country's cyberspace. The measure still needs Europe, signed the treaty in March 2016. This is
further discussion in a legislative committee likely because the Council of Europe oversaw
before it can be considered and approved by the the treaty. The treaty was developed to serve as a
National Assembly. If the process is subject to basis for law enforcement in cyberspace and to
scrutiny by the public, it will take up most of help countries develop consistent rules against
2022 and well into 2023. cybercrime that can guide the behavior of law
Discussions on the National Cyber enforcement agencies. States need to agree that a
Security Strategy began at the beginning of crime committed in one country should be
2022, and so far, no specific cyber legislation treated as a crime in another to address cyber
has been implemented. This highlights how little threats successfully (Council of Europe, 2016).
attention the country's government has given to Without such political coordination, states would
electronic matters. Establishing legislation is one not be able to prosecute international
thing, but ensuring that it can be monitored by cybercriminals successfully. Due to concerns

19 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

about sovereignty, major world powers such as will be responsible for law enforcement and
China and Russia have refused to ratify the provides information on how cybersecurity laws
treaty and have tried to work directly with the and regulatory frameworks should be created.
UN to develop a code of conduct for the Improving cooperation in cyberspace also
Internet. Sovereignty and enforcement will requires the drafting of mutual legal assistance
likely continue [11]. and information-sharing agreements. With low
It is not necessary to sign international voter turnout, Yemen has an opportunity to
agreements to promote cybersecurity. For establish itself as a major player in cyberspace
example, China continues to pursue [15, 16].
cybersecurity cooperation with various partners The International Telecommunication
despite its inability to enter into agreements. Union (ITU) has created the Global
Chinese companies are pursuing multifaceted Cybersecurity Index (GCI) to gauge the
cooperation initiatives with African countries in commitment of countries to cybersecurity. The
the fields of internet development and federation developed this index to raise
governance as part of their commitment to work awareness of the importance and aspects of
with the African Union (AU) to increase and various issues in raising the level of
strengthen cybersecurity on the African cybersecurity and to promote to exchange of
continent (Ogundeji, 2016). Chinese President experiences and sharing of experiences among
Xi Jinping said in February 2014 that he would countries. This indicator was created to
do everything in his power to ensure that China determine the maturity of Member States in
becomes a cyber-superpower by improving cybersecurity according to specific standards and
scientific and technological progress in the is measured every two years. The index is based
country (Austin, 2016) [12-14]. on ranking countries out of 100 on five main
Strengthening cross-border cooperation axes (legal, technical, regulatory, awareness,
in the area of cyber defense is key to preventing capacity building, and cooperation) by analyzing
global cyber-attacks. Due to its globalization, the the performance of countries in 80 sub-
network environment cannot be approached only indicators. They meet as one standard measure
from a national or regional point of view. to monitor the cybersecurity commitment of the
Critical national infrastructure, such as electric member states of the International
utilities, can exist in several countries and even Telecommunication Union (ITU). The closer the
cross international borders. Companies that country's index gets to the correct one, the
manage critical infrastructure in the country may stronger the country's commitment to its
be foreign-owned and networked. cybersecurity is. The smaller the index, the less
Grobler and Van Vuuren disagree (2012: this indicates a weak commitment to the pillars
sixty-four). Yemen's well-developed ICT of its cyber security, and the ranking of Arab
infrastructure puts it in a favorable position to countries varies on the cyber security index, as
dominate in matters related to cybersecurity. The some countries come in advanced ranks and
Draft National Cybersecurity Strategy was most of them are in lagging ranks, where Yemen
created in April 2022. The document provides an comes in the last ranks in those indicators
in-depth explanation of how to create a strong according to the periodic reports of the cyber
information-based society. It outlines the security index shown in Table 2 [17].
responsibilities of the national authorities that

Table 2: The global cybersecurity index (GCI) issued by the international telecommunication union
(ITU).
Year Arabic Ranking World Ranking Index
2015* 14/13 29/27 0.059
2017 22 164 0.007
2018 21 172 0.019
2020** 22 182 0.000

* In 2015, evaluation indicators were calculated according to groups.


** Yemen was not evaluated in the Year 2020 due to the lack of data.

20 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

This is due to the following reasons: borders. Yemen needs a clear focus on
 The absence of a national strategy for cyber cybersecurity as the idea of human security has a
security. significant impact on the security of the country.
 The absence of legal legislation regulating There is still a lack of engagement and
cyber security and governing cybercrime. communication about the importance of
 The absence of national entities concerned cybersecurity to security, although the state has
with cyber security. developed cyber policy frameworks to guide the
 The shortage of expertise and specialized development of more targeted laws. Even the
cadres in cybersecurity. national vision of building a modern Yemeni
 Low level of awareness of users' protection state fails to articulate any clear strategy
procedures. regarding cybersecurity. We highlight one of the
 Weak coordination, cooperation, and recurring themes of this study:
exchange of experience and information Yemen has failed to appreciate the
between the various sectors in the Republic. importance and attention of cybersecurity in its
 Weak coordination and cooperation with policies. This may have been the case because
the relevant international agencies. the authorities miscalculated the potential harm
Implementation of cybersecurity by the world's that cyber-attacks could do to the country. This
leading countries but also for Yemen would also explain why the government has yet
to make available studies to examine the
specifically, will be a key mechanism that can be
used to strengthen the cyber position of the country's cybersecurity.
country. One of the areas where the state can The Cybersecurity and Cybercrime Bill
that the Yemeni government is in the process of
strengthen its position is by sharing information
drafting focuses on laws related to the internet,
and building alliances between the military,
but it is not enough to solve the problems facing
police, and state security. Another tactic to
ensure cybersecurity issues get the attention they Yemen. Public sector capacity building is
deserve is appointing a president who is in important, focusing on technical competencies
such as cybercrime, cryptography, information
charge of cyber resources. Furthermore, it will
security, and other related electronics. One of the
ensure that the government is aware of new
problems facing the country due to the lack of
cyber threats and trends and bring the country in
line with international standards [9]. expertise by the Yemeni police in cyber
operations is the inability to conduct proper
cyber investigations. The Cybercrime and
CONCLUSION
Cybercrime Bill will improve prosecution
This study examined current guidelines, but it needs to be supported by
effective skills development within the country's
cybersecurity issues affecting the security of
Yemen. Besides providing a review of many police force. The military and government
common cyber-attacks, this study also evaluates intelligence services operate in the same way.
ideas about cybersecurity. Finally, this study Better cooperation with the commercial
presented data on the current state of sector and research institutions can help in this
cybersecurity in Yemen and concluded with process. Lack of information sharing about
some recommendations to improve Yemen's cyber-attacks is another problem the country is
facing, especially in the corporate sector, where
cybersecurity in the future.
companies are reluctant to disclose their security
vulnerabilities. To understand a holistic
RECOMMENDATIONS
approach to cybersecurity better, governments
Cybersecurity is an issue for Yemen's need to proactively engage with organizations
that frequently experience cyber-attacks, such as
security and will continue to become more
banks and financial institutions. On the research
important. Terrorist groups like ISIS are
front, the government not only needs to develop
increasingly using the Internet to achieve their
goals. ISIS can use the Internet in Yemen to more focused cyber research but also needs to
recruit new agents and can incite locals to empower organizations like the CSIR’s Center
engage in terrorist activity within the country's for Cyber Security with the resources to help
develop cybersecurity solutions.

21 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

Yemen needs to develop cybersecurity [Online] Available at:


partnerships beyond its borders also. The https://www.semanticscholar.org/paper/Fro
development of cyber alliances with other m-Cyberspace-to-Cyberpower%3A-
countries will play an important role in Defining-the-Problem-
strengthening the country's position in Kuehl/8d747349d6b6c75a6ad94d5f69372d
cybersecurity. There is also an opportunity for e21a359f41.
Yemen to establish itself in terms of 5. Department of Justice (2014), “U.S.
cybersecurity. Implementation of cybersecurity Charges Five Chinese Military Hackers for
initiatives from around the world may also be Cyber Espionage Against U.S. Corporations
beneficial for the country. For example, Yemen and a Labor Organization for Commercial
can provide a special cybersecurity advisor Advantage”, [Online] Available at:
within the presidential office to provide https://www.justice.gov/opa/pr/us-charges-
information on the latest cyber developments as five-chinese-military-hackers-cyber-
they have been in the USA. espionage-against-us-corporations-and-
This study has shown that cybersecurity labor [Accessed on May 2021].
is a growing threat to the security of Yemen. 6. H Nissenbaum (2005). Where Computer
Yemen has made a lot of progress in terms of Security Meets National Security, Ethics
cybersecurity, but given the severity of the and Information Technology, 7(2), 61-73,
problem, it doesn't seem urgent or focused Available at:
enough on the impact of cybersecurity on https://papers.ssrn.com/sol3/papers.cfm?abs
security. Yemen needs to devote more resources tract_id=2567457.
to defending its cyberspace with the 7. G Chon (2015), “US pursues case against
development of cyber weapons and trained Chinese army hackers”, [Online] Available
cybersecurity teams in the rest of the world. at: https://www.ft.com/content/a378b4c6-
Yemen will need to strengthen its cyber posture 62b0-11e5-9846-de406ccb37f2 [Accessed
to protect its population as terrorist groups and on September 2021].
hackers become more adept at launching 8. Polity (2012), “The 2012/13 South African
international cyber-attacks. cyber threat barometer (October 2012)”,
[Online] Available at:
REFERENCES https://www.polity.org.za/article/the-
201213-south-african-cyber-threat-
1. J Sheldon, “The rise of Cyberpower”, barometer-october-2012-2012-10-17
[Online] Available at: [Accessed on October 2021].
https://www.iwp.edu/wp- 9. National Cybersecurity Strategy Project,
content/uploads/2014/07/20140714_TheRis Yemeni Ministry of Communications and
eofCyberpowerbyJohnBSheldon.pdf. Information Technology, 2022.
2. P.W. Singer and A Friedman (2014). 10. M Grobler, J.C. Jansen van Vuuren and J
Cybersecurity and Cyberwar: What Zaaiman (2013). Preparing South Africa for
Everyone Needs to Know, Illustrated cyber crime and cyber defense, Journal of
Edition. Oxford University Press, England. Systemics, Cybernetics and Informatics, 11,
ISBN-10: ‎9780199918119, Available at: 32-41, Available at:
https://www.amazon.com/Cybersecurity- https://www.researchgate.net/publication/31
other security agencies 1811417_Preparing_South_Africa_for_Cyb
wereKnow%C2%AE/dpreviews/019991811 er_Crime_and_Cyber_Defense#:~:text=In
2. %2C%20Preparing%20South%20Africa%2
3. D E. Denning (1998). Information Warfare 0for%20Cyber%20Crime%20and,the%20ci
and Security, Ist Edition. AddisonWesley rcumstance%20of%20cyber-
Professional, Melbourne, US. ISBN- attack%20on%20a%20national%20level.
10: ‎0201433036, Available at: 11. Council of Europe, “Chart of signatures and
https://www.amazon.com/Information- ratifications of Treaty 185”, [Online]
Warfare-Security-Dorothy- Available at:
Denning/dp/0201433036. https://www.coe.int/en/web/conventions/ful
4. D. Kuehl (2009), “From Cyberspace to l-list?module=signatures-by-
Cyberpower: Defining the Problem”,

22 Page 15-23 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2583-4703
Cyber Security in Computer System Volume-1, Issue-3 (September-December, 2022)

www.matjournals.com

treaty&treatynum=185. [Accessed 14 africa/236293-au-china-unite-to-tackle-


March 2022]. cybercrime [Accessed August 2022].
12. African Union (2014), “African Union 15. Cisco, “Security Outcomes Study, Volume
Convention on Cyber Security and Personal 1”, [Online] Available at:
Data Protection”, [Online] Available at: https://www.cisco.com/c/en/us/products/sec
https://au.int/en/treaties/african-union- urity/security-outcomes-study.html.
convention-cyber-security-and-personal- 16. M Grobler and J Jansen van Vuuren (2012).
data-protection [Accessed on June 2021]. Collaboration as proactive measure against
13. G Austin (2016), “Evaluating China’s cyber warfare in South Africa, African
Cyber Power”, [Online] Available at: Security Review, 21(2), 61-73, Available at:
https://thediplomat.com/2016/10/evaluating https://doi.org/10.1080/10246029.2012.654
-chinas-cyber-power/ [Accessed on October 803.
2021]. 17. Committed to connecting the world,
14. Ogundeji, O., 2016. AU, China unite to “Global Cybersecurity Index”, [Online]
tackle cybercrime. [Online] Available at: Available at: https://www.itu.int/en/ITU-
http://www.itwebafrica.com/security/513- D/Cybersecurity/Pages/global-
cybersecurity-index.aspx.

23 Page 15-23 © MAT Journals 2022. All Rights Reserved

You might also like