نوع مقاله : مقاله پژوهشی
نویسندگان
1 استاد و عضوهیات علمی دانشگاه شاهد، تهران، ایران
2 دانشجوی دکترای مدیریت راهبردی امنیت فضای سایبر دانشگاه عالی دفاع ملی، تهران، ایران
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
At the present, the most of economic, commercial, cultural, social and sovereignty activities and interactions at all levels, including individuals, non- governmental organizations and governmental and administrating institutions, take place in cyberspace. Therefore, each of these domains needs its own operational model for monitoring threats. To maintain the integrity of these models, it is necessary to design a strategic reference model to define the aforementioned operational models, below it. This model should help to pay more attention to effective factors and variables and their relationships at the time of planning and making strategic decisions. By explaining the theoretical foundations and paradigms governing this study and also by examining the current status of threat monitoring, comparative studies, review of current laws of Iran and utilizing the upstream documents, the conceptual model of monitoring cyber threats of the Islamic republic of Iran can be designed. Given that Iran has not designed a model to monitor cyber threats, this study attempts to find the reason of it. By conducting descriptive studies and content analysis technique and also utilizing the technique of structural equations, this study, in addition of confirming the proposed model, considers scanning, evaluation and response as the most important dimensions of the cyber threat monitoring model in Iran. Therefore, with considering Iran's constant confrontation with global arrogance and the system of domination, this study proposes to accelerate the creation and development of a national information network, which leads to an increase in resilience and adaptation capacity.
کلیدواژهها [English]
ب)منابع لاتین
1.Abdul Razzaq, Ali Hur, H Farooq Ahmad, Muddassar Masood,(2013) ،Cyber Security: Threats,Reasons, Challenges, Methodologies and State ofthe Art Solutions for Industrial Applications , National University of Sciences and Technology, Islamabad, Pakistan,
2.C. Simmons, S. Shiva, C. Ellis, D. Dasgupta, S. Roy, and Q. Wu, “AVOIDIT،2009، A Cyber Attack Taxonomy,” Technical Report, University of Memphis.
4.EE-ISAC,2017, The European threat landscape, accessible : http://www.ee-isac.eu/seminar
5.FACT SHEET,2015, Executive Order Promoting Private Sector Cybersecurity Information Sharing, The White House
9.Hair, J. F., Hult, G. T. M., Ringle, C. M., and Sarstedt, M. 2014. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage: Thousand Oaks.
10.M. Kjaerland, 2005،”A Taxonomy and Comparison of Computer Security Incidents from the Commercial and ،Government Sectors,” Computers and Security, Vol. 25,
11.Morana, Marco; UcedaVelez, Tony (2011). Application threat modeling. Oxford: Wiley-Blackwell. p. 37. ISBN 978-0-470-50096-5.
12.Matt Loeb, 2015, Cybersecurity Global Status Report ,acceissble : https://www.isaca.org/pages/cybersecurity-global-status-report.aspx
13.NIST,2016, Guide to Cyber Threat Information Sharing , National Institute of Standards and Technology
14.S. Hansman and R. Hunt,2005، “A Taxonomy of Network and Computer Attacks,” Computer and Security.
MITRE, 2012, How Do You Assess Your Organization’s Cyber Threat Level, The MITRE Corporation
15.Neo Park ,Won Hyung Park,(2012) Cyber Threat Prediction Model Using Security Monitoring System Event, Springer Netherlands
16.The MITRE Corporation, 2015, “Cyber Operations Rapid Assessment - Examining the State of Cybersecurity Assessment Methodologies and Introducing a New Alternative
17.Medina Llinás,2016, Identifying and combating cyber-threats in the field of online banking, Universitat Politècnica de Catalunya.
18.SHAW,2010, CYBERSPACE: WHAT SENIOR MILITARY LEADERS NEED TO KNOW accessible in ,http://handle.dtic.mil/100.2/ADA520146
19.Sandia, 2012, Cyber Threat Metrics, Sandia National Laboratories,Susana B. Adamo, 2013, State and Trends of the Environment, accessible in http://www.unep.org/geo/pdfs/geo5/geo5_report_c1.pdf
20.Sommestad , teodor , 2012, A framework and theory for cyber security assessments, Industrial Information and Control Systems KTH, Royal Institute of Technology Stockholm, Sweden
21.Tenenhaus, M. Amato, S. Esposito Vinzi, V. 2004. A Global Goodness-Of-Fit Index for Pls Structural Equation Modeling. In Proceedings of the Xlii Sis Scientific Meeting, 739-742
22.USGAO,2010، United States Faces Challenges in Addressing Global Cybersecurity and Governance, United States Government Accountability Office.
24.William F. Pelgrin,2005, Cyber Security Awareness, MULTI-STATE INFORMATION SHARING AND ANALYSIS CENTER (MS-ISAC)
ج)تارنما