Document Type : Original Article
Authors
1 Professor at Shahed University, Tehran, Iran
2 Ph.D. Candidate in Strategic Management of Cyber Space security at Supreme National Defence University, Tehran, Iran.
Abstract
Keywords
ب)منابع لاتین
1.Abdul Razzaq, Ali Hur, H Farooq Ahmad, Muddassar Masood,(2013) ،Cyber Security: Threats,Reasons, Challenges, Methodologies and State ofthe Art Solutions for Industrial Applications , National University of Sciences and Technology, Islamabad, Pakistan,
2.C. Simmons, S. Shiva, C. Ellis, D. Dasgupta, S. Roy, and Q. Wu, “AVOIDIT،2009، A Cyber Attack Taxonomy,” Technical Report, University of Memphis.
4.EE-ISAC,2017, The European threat landscape, accessible : http://www.ee-isac.eu/seminar
5.FACT SHEET,2015, Executive Order Promoting Private Sector Cybersecurity Information Sharing, The White House
9.Hair, J. F., Hult, G. T. M., Ringle, C. M., and Sarstedt, M. 2014. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage: Thousand Oaks.
10.M. Kjaerland, 2005،”A Taxonomy and Comparison of Computer Security Incidents from the Commercial and ،Government Sectors,” Computers and Security, Vol. 25,
11.Morana, Marco; UcedaVelez, Tony (2011). Application threat modeling. Oxford: Wiley-Blackwell. p. 37. ISBN 978-0-470-50096-5.
12.Matt Loeb, 2015, Cybersecurity Global Status Report ,acceissble : https://www.isaca.org/pages/cybersecurity-global-status-report.aspx
13.NIST,2016, Guide to Cyber Threat Information Sharing , National Institute of Standards and Technology
14.S. Hansman and R. Hunt,2005، “A Taxonomy of Network and Computer Attacks,” Computer and Security.
MITRE, 2012, How Do You Assess Your Organization’s Cyber Threat Level, The MITRE Corporation
15.Neo Park ,Won Hyung Park,(2012) Cyber Threat Prediction Model Using Security Monitoring System Event, Springer Netherlands
16.The MITRE Corporation, 2015, “Cyber Operations Rapid Assessment - Examining the State of Cybersecurity Assessment Methodologies and Introducing a New Alternative
17.Medina Llinás,2016, Identifying and combating cyber-threats in the field of online banking, Universitat Politècnica de Catalunya.
18.SHAW,2010, CYBERSPACE: WHAT SENIOR MILITARY LEADERS NEED TO KNOW accessible in ,http://handle.dtic.mil/100.2/ADA520146
19.Sandia, 2012, Cyber Threat Metrics, Sandia National Laboratories,Susana B. Adamo, 2013, State and Trends of the Environment, accessible in http://www.unep.org/geo/pdfs/geo5/geo5_report_c1.pdf
20.Sommestad , teodor , 2012, A framework and theory for cyber security assessments, Industrial Information and Control Systems KTH, Royal Institute of Technology Stockholm, Sweden
21.Tenenhaus, M. Amato, S. Esposito Vinzi, V. 2004. A Global Goodness-Of-Fit Index for Pls Structural Equation Modeling. In Proceedings of the Xlii Sis Scientific Meeting, 739-742
22.USGAO,2010، United States Faces Challenges in Addressing Global Cybersecurity and Governance, United States Government Accountability Office.
24.William F. Pelgrin,2005, Cyber Security Awareness, MULTI-STATE INFORMATION SHARING AND ANALYSIS CENTER (MS-ISAC)
ج)تارنما