The Current Status of Cyber Security in
The Current Status of Cyber Security in
Ethiopia
Kibreab Adane*
The increase in cyber attacks in Ethiopia has become a crucial point. Ethiopia is a low-income
country and cannot afford the cost data breaches. Unless institutions in Ethiopia give careful
attention to the protection of their valuable assets such as people, information, technology and
facilities from evolving cyber attacks, their overall security, privacy and credibility will be a
question mark. The paper attempts to present the current status of cyber security in Ethiopia
and answers the following key questions: (1) Is there any research or experts report in relation
to cyber security in Ethiopia? (2) What are the significant contributions made by prior researchers?
and (3) What are re-searchability gaps in the reviewed research? Qualitative techniques are
used to analyze the data. The findings reveal that currently Ethiopia has no standardized legal
cyber security framework, strategy and governance at the national level. Only 11.6% of
government institutions in Ethiopia have legal frameworks which are being at their trial level,
while the majority or 87.4% of them have no recognized legal frameworks to prevent cyber
attacks. In addition, lack of awareness and lack of expertise in cyber security also contributed
to the increasing level of cyber attacks in the country. To address the aforementioned issues
and challenges, some local researchers are developing cyber security frameworks and strategies
for some sectors such as banks, railway industries, Ethiopian Electric Power, Ethiopian Eectric
Utility and Ethio Telecom. However, those frameworks were not rigorously tested. Moreover,
to overcome the acute shortage of cyber security professionals and lack of cyber security know-
how in the country, future researchers should be focusing on the development of virtual
training system or intelligent security tutoring system, so that stakeholders in various institutions
can learn cyber security basics by interacting with the machine.
Keywords: Cyber security, Cyber attacks, Threats, Legal framework, Ethiopia, Information
Network Security Agency (INSA)
Introduction
Africa is confronting various Internet-related challenges in relation to the security risk,
intellectual property right violation and protection of personal data. Even though cyber
criminals target people from both inside and outside their country, most African
governments have neither the technical nor the financial capacity to identify and monitor
electronic exchanges, thought to be sensitive for national security (ECA, 2014).
It is believed that the number of cyber crimes of Africa cost an estimated total of $3.5
bn in 2017. This was supposedly due to weak infrastructure security, lack of skilled
human capital and lack of awareness of the sector’s dynamics Mathe (2019).
* Faculty, Computing and Software Engineering, Arba Minch University, Arba Minch, Ethiopia.
E-mail: [email protected]
The
© 2020
Current
IUP. All
Status
Rights
of Cyber
Reserved.
Security in Ethiopia 1
2. Research Approach
In order to understand the contribution of different researchers in the world, this
study critically reviewed the available research papers, journal articles, theses
documents and INSA reports that are focused on cyber security in Ethiopia. After an
intensive search, the researcher found only eight research papers in the context of
cyber security in Ethiopia. Moreover, the research used qualitative techniques and
attempts to answer the following key questions:
• Is there any research in relation to cyber security in Ethiopia?
• What are the significant contributions made by prior researchers?
• What are the researchability gaps in the reviewed research work?
Table 1 shows the critical review of eight research papers in the context of cyber
security in Ethiopia including its significant contributions and researchability gaps.
S.
Research Title Author (s) Significant Contribution Researchability Gaps
No.
report that shows the exact prevalence and develop cyber security governance framework
impact of cyber crime in Ethiopia and to what or model, what are the main elements to be
extent the Ethiopian information society is included in the framework or model are not
vulnerable. addressed by the researcher.
The researcher suggested the following points as Hence design and development of the cyber
a solution: security governance framework are also the main
research areas.
• Strengthen cyber security governance in
Ethiopia; comprehensive legal frameworks on
cyber security and promoting cyber crime
5
6
Table 1 (Cont.)
S.
Research Title Author (s) Significant Contributions Researchability Gaps
No.
Issues of acute shortage of cyber security
professionals in banking sectors in Ethiopia are
not addressed by the researcher. Hence, the
future researcher shall focus on the development
of virtual training system or intelligent security
training system to build the capacity of banking
stakeholders.
4. The Quandary of Temesgen The researcher found out the dilemma of cyber The findings are relevant and it assessed the
Cyber Governance in (2019) governance in Ethiopia and the findings revealed dilemma of cyber governance in Ethiopia but
Ethiopia that there are a number of legal, policy and still the research findings did not show why the
institutional initiatives designed to guide cyber Ethiopian Government excessively controlled
governance in Ethiopia. However, the overall the information access? Is it intentional or
aspects of cyber governance have posed a peril to unintentional? what type of information is highly
digital landscape; there is excessive control and restricted to access by the government? Why is
restriction of access to information in Ethiopian not articulated by the researcher? Future
digital landscape; institutional structures lack research is required to fill the aforementioned
transparency and coordination of tasks for gaps.
responsive service delivery.
The researcher suggested that the government
must focus on expanding the infrastructure to
assure accessibility and revising the policies and
legal instruments to ensure digital freedom so as
to get the maximum blessings that the digital
S.
Research Title Author (s) Significant Contributions Researchability Gaps
No.
Regional the Council of Europe and Africa Union to collect relevant information and no court cases
Experiences Convention on cyber security. The study are analyzed by the researcher to say there are
revealed that the expansion of telecom still some gaps that need improvement with regard
infrastructure in Ethiopia has not been matched to the proclamation including the right to privacy
with equal investment in the fields of security and the interest of the society as whole to be
and adequate legislation to govern the area; protected from cyber crime.
Ethiopia is one of the countries increasingly
Further research is required to reassess cyber
becoming victims of cyber crimes in Africa, and
crimes in Ethiopia by including the recent reports
until very recently, it did not even have adequate
of INSA and by analyzing court cases.
legislation to govern the matter.
7
8
Table 1 (Cont.)
S.
Research Title Author (s) Significant Contributions Researchability Gaps
No.
7. Developing National Abenezer The researcher developed National Cyber This paper fills the gaps in national cyber security
Cyber Security (2019) Security Strategy for Ethiopia. The main argument in Ethiopia by developing cyber security strategy.
Strategy for Ethiopia of this study is national cyber security strategy is a In order to develop cyber security strategy, the
useful tool to solve cyber security problems at a authors followed the National Cyber Security
national level, and countries can learn from other Strategies of Canada, Germany, Singapore and
countries. The study revealed that despite the Rwanda. However, in terms of security culture,
existence of National Information Security Policy economy, political ideology and technological
in Ethiopia, there is an apparent lack of practical infrastructure; these countries are not similar with
and comprehensive strategy that addresses Ethiopia. Hence, future researchers shall use this
contemporary cyber security challenges. Lack of research as knowledge base and consider the
effective measures to fight against cyber incidents aforementioned gaps to improve this cyber
have resulted in the growth of cyber crime in the security strategy.
country.
8. Developing Cyber Mulualem The author developed cyber security risk This paper fills the gaps in Cyber Security Risk
Security Risk (2018) assessment framework for railways industry in Assessment Framework for Railways Industry in
Assessment Ethiopia by reviewing current state of cyber Ethiopia. However, “railways strategic and tactical
Framework for security risk assessment process, guideline, risk assessment process” and “railways cyber security
Railways Industry in standards in Ethiopia and other international risk management process” requires future research.
Ethiopia standards. Using this research as knowledge base future,
researchers are developing Cyber Security Risk
Conclusion
The paper presents the current status of cyber security in Ethiopia by rigorously reviewing
the existing literature. It attempted to excavate the main gaps and future research to
repel the evolving cyber attacks in Ethiopia.
The finding revealed that there is an increasing level of cyber attacks in Ethiopia
due to the fact that currently Ethiopia has no well-standardized legal framework to
tackle cyber attacks both at institutional and national levels. Only 11.6% of government
institutions in Ethiopia have legal frameworks which are at their trial level, while a
majority or about 87.4% of these institutions have no recognized legal framework to
prevent cyber attacks. The employees, partners, well-organized criminals, cyber
terrorists and government and non-government sponsored are considered as the main
References
1. Abenezer Berhanu (2019), “Developing National Cybersecurity Strategy for
Ethiopia”, Master’s Thesis, Tallinn University of Technology, School of Information
Technologies, Department of Software Science, pp. 12-65, available at:
digikogu.taltech.ee › Download, 06ef8980905c4c0894d17918a42e80a0%20(3).pd
2. African Cyber Security Market (2015), “Africa Cyber Security Market by Solution
(IAM, IDS/IPS, Risk & Compliance, Encryption, Antivirus, Firewall, DLP, UTM,
SVM, Disaster Recovery & Business Continuity, DDOS Mitigation, Web
Filtering)”, by Service, by Verticals, by Country-Forecast to 2020, available at:
https://www.marketsandmarkets.com/Market-Reports/africa-cyber-security-
market-201727948.html
3. Balcha Reba (2005), “State of Cyber Security in Ethiopia”, Ethiopian
Telecommunications Agency Standards and Inspection Department Head,
Standards Division, Ethiopian Telecommunications Agency, pp. 2-6, available at:
http://www.itu.int/osg/spu/cybersecurity/contributions/Ethiopia_Reba_paper.pdf
4. ECA (2014), “Tackling the Challenges of Cybersecurity in Africa”, Policy Brief,
NTIS/002/2014, pp. 1-6, available at: https://www.uneca.org/sites/default/files/
PublicationFiles/ntis_policy_brief_1.pdf
5. ENA (2019), “INSA Alarmed by Increase in Cyber Attacks, Calls for Swift
Actions”, Addis Ababa, November 4, 2019, Ethiopian News Agency Report,
The Current Status of Cyber Security in Ethiopia 11
Reference # 35J-2020-09-0x-01