Computer Science and Engineering
p-ISSN: 2163-1484 e-ISSN: 2163-1492
2025; 15(6): 153-160
doi:10.5923/j.computer.20251506.04
Received: Oct. 6, 2025; Accepted: Nov. 3, 2025; Published: Nov. 26, 2025

Howard Khaki Kaleba, Simon Tembo
Department of Electrical and Electronics Engineering, University of Zambia, Lusaka, Zambia
Correspondence to: Simon Tembo, Department of Electrical and Electronics Engineering, University of Zambia, Lusaka, Zambia.
| Email: | ![]() |
Copyright © 2025 The Author(s). Published by Scientific & Academic Publishing.
This work is licensed under the Creative Commons Attribution International License (CC BY).
http://creativecommons.org/licenses/by/4.0/

Despite growing global concern about cyber threats to critical infrastructure (CI), Zambia lacks a comprehensive, data-driven framework to assess and quantify cyber risks across its essential systems. Existing risk assessment models are often qualitative or based on generalized international methodologies that do not adequately account for the unique infrastructure vulnerabilities, resource constraints, and operational challenges prevalent in developing nations. This research addresses this critical gap by developing and validating a quantitative framework for assessing cyber risks to Zambia's CI sectors. The framework is specifically designed to incorporate context-specific factors relevant to the Zambian environment. Employing a mixed-methods approach that integrates Bayesian Network (BN) analysis with a detailed economic impact assessment, this study analyzed empirical data collected from 47 critical infrastructure facilities across Zambia's energy, telecommunications, and transportation sectors over 18 months. The findings reveal significant disparities in cybersecurity maturity across sectors, with telecommunications demonstrating the highest maturity (3.2/5.0) and transportation the lowest (2.3/5.0). The quantitative risk assessment framework, with the BN model at its core, achieved an 84.2% accuracy in predicting cyber risks, significantly outperforming traditional frameworks (71.2% accuracy) when applied within Zambia's context. The analysis identified malware attacks (42.3%) and network-based threats (31.5%) as the primary risks, with potential economic impacts estimated to range from $1.23 million to $3.55 million per incident. This research contributes to both the theoretical understanding and practical implementation of cyber risk assessment in developing nations. The proposed framework provides a robust, evidence-based foundation for strategic cybersecurity investment decisions and national policy development, while systematically accounting for local conditions and resource limitations.
Keywords: Critical Infrastructure Protection, Cyber Risk Assessment, Quantitative Analysis, Bayesian Networks, Developing Nations, Zambia, Cybersecurity Maturity, Economic Impact
Cite this paper: Howard Khaki Kaleba, Simon Tembo, Quantitative Cyber Risk Assessment for Critical Infrastructure in Zambia: A Bayesian Network Approach, Computer Science and Engineering, Vol. 15 No. 6, 2025, pp. 153-160. doi: 10.5923/j.computer.20251506.04.
![]() | Figure 1. A simplified Bayesian Network illustrating probabilistic dependencies in Zambia's telecommunications sector. Node values represent conditional probabilities of cyber threat events |
Where:•
is the total quantified risk.•
represents the
individual threat scenario.•
represents the
specific vulnerability.•
is the probability of threat
occurring.•
is the conditional probability of vulnerability
being exploited given threat
•
is the quantified impact (consequence) of
exploiting
•
is the number of threat scenarios considered.•
is the number of vulnerabilities considered.
Where
is the posterior probability of the event
given evidence
.This dynamic updating capability is crucial for real-time risk management. The joint probability distribution for the entire network, which allows for the calculation of any probability of interest, is calculated as the product of the conditional probabilities of each node given its parents, as shown in Equation (3):
This equation represents the joint probability distribution across all nodes in a Bayesian Network.The structure of the BN was developed through a hybrid approach. An initial structure was learned from the collected data using score-based algorithms (e.g., Hill-Climbing with a Bayesian Information Criterion score) to identify statistical dependencies [17]. This data-driven structure was then refined and validated by the panel of experts to ensure it accurately reflected the causal mechanisms of cyber risk in the Zambian context, incorporating domain knowledge that may not be present in the data alone. This process helped define the key nodes and their relationships, such as how 'Lack of Staff Training' and 'Outdated Antivirus' (parent nodes) influence the 'Likelihood of Phishing Success' (child node). The CPTs were parameterized using a combination of statistical frequency counts from the 18-month dataset and expert-elicited probabilities for scenarios where data was sparse, a common challenge in developing nations. This hybrid structure is ideal for capturing the complex, cascading effects within and between CI sectors and for reasoning under the uncertainty inherent in the Zambian context.
Where:•
represents direct costs.•
represents indirect costs.•
is the recovery cost at time
.•
is the discount rate.•
is the total recovery period.This model provided a robust financial metric for the potential impact of a cyber incident, allowing for risk to be expressed in monetary terms that are easily understood by business leaders and policymakers.
Where:•
= True Positives•
= True Negatives•
= False Positives•
= False NegativesThis systematic validation process was crucial for establishing the credibility and superior performance of the proposed BN-based framework.
|
![]() | Figure 2. Security Maturity Distribution Across Sectors, comparing Energy, Telecommunications, and Transportation. |
|
![]() | Figure 3. Distribution of Vulnerability Types, showing Technical (42.3%), Operational (31.5%), and Administrative (26.2%) vulnerabilities |