Thesis Open Access
EYOB MOLA
<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
<leader>00000nam##2200000uu#4500</leader>
<datafield tag="653" ind1=" " ind2=" ">
<subfield code="a">Cyber security, Cyber Attack, Cyber Warfare, National Security, Policy, Vulnerability</subfield>
</datafield>
<controlfield tag="005">20251202112856.0</controlfield>
<controlfield tag="001">22380</controlfield>
<datafield tag="856" ind1="4" ind2=" ">
<subfield code="s">1426135</subfield>
<subfield code="z">md5:721952ba293870dde8cca5746b1bcdb6</subfield>
<subfield code="u">https://zenodo.org/record/22380/files/Eyob Thesis.pdf</subfield>
</datafield>
<datafield tag="542" ind1=" " ind2=" ">
<subfield code="l">open</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="c">2023-05-23</subfield>
</datafield>
<datafield tag="909" ind1="C" ind2="O">
<subfield code="o">oai:zenodo.org:22380</subfield>
</datafield>
<datafield tag="100" ind1=" " ind2=" ">
<subfield code="a">EYOB MOLA</subfield>
</datafield>
<datafield tag="245" ind1=" " ind2=" ">
<subfield code="a">STUDY THE EFFECT OF CYBER-ATTACKS ON ETHIOPIAN NATIONAL SECURITY</subfield>
</datafield>
<datafield tag="540" ind1=" " ind2=" ">
<subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
<subfield code="a">Creative Commons Attribution</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="7">
<subfield code="a">cc-by</subfield>
<subfield code="2">opendefinition.org</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a"><p>Cyber-attacks potentially destabilize a country&#39;s political and economic structures, leading to economic losses, political instability, and social unrest. Criminal groups and state actors use different techniques to attack targeted nations. These include denial-of-service attacks, infrastructure spying, damaging critical infrastructure, data breaching, identity theft, ransom attacks, cyber espionage, malware distribution, phishing, financial fraud, and cyber warfare. Ethiopia is vulnerable, experiencing critical cyber-attacks that threaten national security, human rights, and democratic governance, disrupting vital security institutions, telecommunications, and the financial sector. This study examined cyber-attacks in Ethiopia, focusing on the factors contributing to these attacks. It also inspected the effects of cyber-attacks on Ethiopia&rsquo;s national security. The study also identified the challenges in implementing Ethiopia&#39;s current cyber security policy. The study employed phenomenological and interpretivism research paradigms, a descriptive design, a qualitative research approach, purposive sampling semi-structured interviews, and document analysis methods to address the objectives of the study. The data were analyzed using thematic and content analyses. The major finding indicates that cyber-attacks increase in terms of frequency and sophistication, thereby posing a significant threat to national security. These attacks targeted government networks, security institutions, and the banking sector. On the other hand, lack of awareness, weak cyber security measures, insufficient training and education, and lack of native social media and software platforms are factors that contribute to the escalation of cyber-attacks. The study revealed that lack of awareness, inadequate collaboration, legal and regulatory compliance, evolving threats, and lack of cyber policy, regulation, and research expertise are major challenges. To conclude, the current cyber-attack and its effect on Ethiopian national security are multifaceted and critical. Thus, this study recommended that the government must strengthen cyber security policy and standards and their implementation, employ cyber security training and education, empowering indigenous technology innovation and expertise to overcome the rapid and dynamic cyber-attack trends<br>
&nbsp;</p></subfield>
</datafield>
<datafield tag="773" ind1=" " ind2=" ">
<subfield code="n">doi</subfield>
<subfield code="i">isVersionOf</subfield>
<subfield code="a">10.20372/nadre:22379</subfield>
</datafield>
<datafield tag="024" ind1=" " ind2=" ">
<subfield code="a">10.20372/nadre:22380</subfield>
<subfield code="2">doi</subfield>
</datafield>
<datafield tag="980" ind1=" " ind2=" ">
<subfield code="a">publication</subfield>
<subfield code="b">thesis</subfield>
</datafield>
</record>
| All versions | This version | |
|---|---|---|
| Views | 0 | 0 |
| Downloads | 0 | 0 |
| Data volume | 0 Bytes | 0 Bytes |
| Unique views | 0 | 0 |
| Unique downloads | 0 | 0 |