Abstract
Cybersecurity has emerged as a critical concern on a global scale, and Albania is no exception. This paper delves into Albania’s current cybersecurity challenges, shedding light on existing vulnerabilities and presenting recommendations to enhance the nation’s resilience against cyber threats, considering the country’s E.U. perspectives. The paper explores critical facets of cybersecurity, including the vulnerabilities within the country’s infrastructure, the regulatory framework, and the prevalent skills gap. By addressing these aspects, a comprehensive overview is provided, outlining Albania’s challenges in safeguarding its digital assets. The methodology used in this paper applies a theoretical approach based mainly on qualitative methods using secondary data and information, analyzing, comparing, and evaluating sources coming mainly from secondary sources, national and international ones. Through this method, the paper aims to offer a nuanced understanding of the cybersecurity landscape in Albania and its E.U. challenges regarding cybersecurity perspectives. In summary, this research concludes that by addressing cybersecurity challenges, Albania will be more effectively integrated into the E.U. and the global market economy, benefiting well-being and creating a more secure society.
Publisher
Canadian Institute of Technology
Reference37 articles.
1. AKCESK, (2023). A safe cyber ecosystem for Albania. Cybersecurity Strategic visions. https://cesk.gov.al/en/a-safe-cyber-ecosystem-for-albania;
2. AKCESK, (2022). Raporti Vjetor 2022. https://cesk.gov.al/en/category/annual-reports;
3. COM, (2012). European Union, Charter of Fundamental Rights of the European Union, C 326/02, Brussels, 26.10.2012, pp. 391–407;
4. Couture, S. and Toupin, S. (2018). ‘What does the concept of “sovereignty” mean in digital, network and technological sovereignty?’, paper presented at Giga Net: Global Internet Governance Academic Network, Annual Symposium 2017, 2018 (http://dx.doi.org/10.2139/ssrn.3107272);
5. Debar, H., (2019). Vulnerabilities in the Internet of Medical Things, FOSAD;