1- Subject of Study
Cybersecurity Vulnerabilities in Critical Somali Institutional Systems: Banks, Government, and Organizations

2- Research Question (Up to 15 words)
How do cybersecurity weaknesses in Somali banks and government agencies enable cyber threats?


3- Analysis of the Problem (75–300 words)
Cybersecurity is a growing concern in Somalia, where banks, government agencies, and large organizations increasingly rely on digital systems for financial and operational activities. Despite investments in IT infrastructure, Somali institutions remain vulnerable to cyber threats due to outdated software, weak system configurations, insufficient employee training, and inadequate incident response protocols. For instance, banks such as Amal Bank, Salaam Somali Bank, IBS Bank, and Dahabshiil Bank face attacks on online banking platforms, ATM networks, and internal databases, often exploiting weak authentication or misconfigured systems. Government systems are targeted by ransomware, data theft, and cyber espionage, exacerbated by legacy infrastructure and limited cybersecurity policies. Organizations face risks from phishing, insider threats, and unsecured third-party service providers.

This study uses a conceptual framework mapping vulnerabilities across three layers: technical (software, network, hardware flaws), organizational (policies, training, awareness), and human factors (employee behavior and insider threats). The theoretical foundation emphasizes that effective cybersecurity cannot rely solely on technology—it requires an integrated approach addressing technical, human, and procedural vulnerabilities. A concept map will connect vulnerability types with potential attack vectors, allowing systematic analysis of risk patterns in Somali institutions and proposing strategies to reduce cyber threats.

4- Research Method (50–300 words)
The study will adopt a mixed-methods approach combining qualitative and quantitative research. First, a survey of IT professionals in Somali banks, government agencies, and organizations will identify the most common weaknesses and risk perceptions. Second, semi-structured interviews with cybersecurity experts and system administrators will explore detailed insights on vulnerability exploitation and mitigation strategies specific to Somali institutions. Finally, secondary data analysis of reported breaches, audits, and vulnerability reports in Somali banks and government systems will quantify trends and compare vulnerabilities across sectors.

This layered methodology ensures both empirical data and expert judgment are incorporated. Surveys provide patterns of institutional weaknesses, interviews give context-rich insights into local challenges, and secondary data analysis validates findings. Ethical considerations, including confidentiality and non-disclosure of sensitive data, will be strictly followed, especially given the sensitivity of financial and government systems in Somalia.

5- Preliminary Answer to the Research Question (75–300 words)
Preliminary research indicates that cybersecurity weaknesses in Somali institutions are driven more by organizational and human factors than purely technical flaws. Many breaches occur due to misconfigured systems, outdated software, and employees unaware of phishing or social engineering tactics. Somali banks such as Amal Bank, IBS Bank, Salaam Somali Bank, and Dahabshiil Bank face frequent attacks targeting online transactions, internal databases, and customer data, often exploiting weak authentication and monitoring gaps. Government systems are vulnerable to ransomware, data theft, and cyber espionage, usually facilitated by legacy infrastructure and limited cybersecurity policies. Organizations encounter attacks from external hackers and insiders, particularly through unsecured third-party services.

Technology alone cannot prevent attacks; robust security policies, continuous training, and proactive monitoring are critical. Institutions integrating technical safeguards with employee education, incident response plans, and regular audits demonstrate measurable reductions in successful attacks. Conceptually, this supports a layered defense strategy where technical, organizational, and human factors are addressed together. Initial findings suggest that improving employee awareness, patch management, and monitoring tools can significantly reduce the exploitation of Somali institutional systems.

6- Academic Contribution of the Study (75–300 words)
This study contributes to cybersecurity scholarship by providing an integrated analysis of vulnerabilities in Somali banks, government agencies, and organizations—a context that is underexplored in academic literature. Unlike studies focused on global institutions, this research emphasizes the interplay between technical flaws, organizational policies, and human factors in a Somali context. By developing a concept map linking vulnerabilities to attack vectors, the study provides a framework for understanding and mitigating systemic risks in Somali institutions.

Moreover, it bridges the gap between academic research and practical implementation by offering insights for Somali policymakers, IT security teams, and organizational leaders to prioritize cybersecurity measures. The study informs risk assessment, employee training programs, and infrastructure investments, strengthening resilience against cyber threats. Its contribution to preventive cybersecurity strategies can guide curriculum development for local cybersecurity programs, support national digital security policies, and help Somali banks and organizations implement effective security frameworks.

7- Literature Review (75–300 words)
The study draws on research from both academic and industry sources. Key studies include Schneier (2015) on the human factor in cybersecurity, Anderson & Moore (2019) on the economics of security in financial institutions, and Mavroeidis & Bromiley (2017) on risk assessment in government systems. Case studies such as the Bangladesh Bank heist and various ransomware attacks illustrate how organizational weaknesses amplify technical vulnerabilities, which is directly relevant to Somali banks like Dahabshiil and Amal Bank.

Additional sources include OWASP reports on web and network vulnerabilities, ENISA threat assessments, and Verizon’s Data Breach Investigations Report. These emphasize the multi-layered nature of institutional cybersecurity and the need for integrated approaches that consider technical, organizational, and human factors. By synthesizing these sources, the study positions itself within current discourse while addressing the gap in research specific to Somali banks, government agencies, and organizational systems, thus justifying the relevance and urgency of this investigation.