International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Information Security | Malaysia | Volume 6 Issue 12, December 2017


Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin | Jamaludin Ibrahim [7]


Abstract: This paper evaluates cybersecurity effectiveness in preserving Maqasid al-Shariah most valuable assets through measuring its ability to protect them from modern cyber threats and cyber-attacks. In order to perform this evaluation we proposed a model that uses Maqasid al-Shariah to decide on the priorities and assets that should be safeguarded and protected from cyber-attacks.


Keywords: Maqasid Shariah Cybersecurity, Islam and Cybersecurity, Islam and Cyberattacks, Islam and Cyber threats, Maqasid Shariah, Cybersecurity capability maturity model, C2M2, MS-C2M2, Cybersecurity,


Edition: Volume 6 Issue 12, December 2017,


Pages: 1095 - 1098


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Yassir Izzadin, Jamaludin Ibrahim, "Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 1095-1098, https://www.ijsr.net/get_abstract.php?paper_id=ART20178654

Similar Articles with Keyword 'Cybersecurity'

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Information Security, India, Volume 13 Issue 3, March 2024

Pages: 520 - 523

Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology

Dr. Ashok Kumar Yadav

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 2, February 2024

Pages: 1872 - 1881

Cloud - Based Ransomware Attack on US Financial Institutions: An In - depth Analysis of Tactics and Counter Measures

Oladipupo M. Dopamu

Share this Article
Top