In the age of the Internet, cybersecurity poses major challenges to the sovereignty of both developing and developed countries. The first step in addressing the risks is to correctly measure the cybersecurity of the organizations/countries and formulate appropriate remedial actions. Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. The Maqasid Al-Shari‘ah or the higher objectives of Al-Shari‘ah seeks to preserve five high-level assets and environment that are considered critical to individual and society at large: ...
© 2017 SCPE. Cyber space is affecting all areas of our life. Cloud computing is the cutting-edge tec...
Critical infrastructures are vital assets for the public safety, economic welfare and national secur...
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been...
In the age of the Internet, cybersecurity poses major challenges to the sovereignty of both developi...
Motivation and objective of the research are due to the ever increasing cybercrime and how important...
Knowing how vulnerable an organisation or a state towards cyberattacks, is referred to as Cyber secu...
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity sta...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
Nowadays, cybersecurity plays a bigger role in the world of technology whereby each and each of the ...
African countries are at high risk with respect to cybersecurity breaches and are experiencing subst...
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and i...
The evolution of information systems has escalated significantly within the last decade as research ...
© 2017 SCPE. Cyber space is affecting all areas of our life. Cloud computing is the cutting-edge tec...
Critical infrastructures are vital assets for the public safety, economic welfare and national secur...
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been...
In the age of the Internet, cybersecurity poses major challenges to the sovereignty of both developi...
Motivation and objective of the research are due to the ever increasing cybercrime and how important...
Knowing how vulnerable an organisation or a state towards cyberattacks, is referred to as Cyber secu...
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity sta...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
Nowadays, cybersecurity plays a bigger role in the world of technology whereby each and each of the ...
African countries are at high risk with respect to cybersecurity breaches and are experiencing subst...
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and i...
The evolution of information systems has escalated significantly within the last decade as research ...
© 2017 SCPE. Cyber space is affecting all areas of our life. Cloud computing is the cutting-edge tec...
Critical infrastructures are vital assets for the public safety, economic welfare and national secur...
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been...