Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2023
  • Volume: 

    13
  • Issue: 

    4
  • Pages: 

    21-38
Measures: 
  • Citations: 

    0
  • Views: 

    455
  • Downloads: 

    111
Abstract: 

With the advent of the digital age, the need for governments and companies to use information technology to optimize performance, Business process smartening and provide remote services has increased. Thus, information technology and Cyber security and information have also found a special place in the digital arena. Accordingly, one of the most serious dangers that governments face, which can also undermine national security, is Cyber-attacks. These attacks cover a wide range of targets, one of the main of which is to damage critical infrastructure. Therefore, the sustainability of critical infrastructure in the face of such threats is crucial. This study, considering that the security of vital infrastructure is one of the most important factors in ensuring national security and passive defense, seeks to obtain the indicators of security of critical infrastructure through a comparative study method using library resources. In this study, 10 of the most important models of Cyber security and information security maturity have been analyzed. The results of this study indicate that the studied models have a total of 93 indicators. Cyber security and information security maturity models are significantly similar,Therefore, some of the counted indicators overlap. Overlapping indicators were identified and classified into 17 groups. The results show that the "incident Management" index with a frequency of 11 is the most important index in securing critical infrastructure, as well as physical security, monitoring, access-identity control, security policies and other indicators in They are next.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 455

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 111 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

NOORI FATEMEH

Issue Info: 
  • Year: 

    2015
  • Volume: 

    1
Measures: 
  • Views: 

    192
  • Downloads: 

    0
Abstract: 

DUE TO THE NATURE OF CyberSPACE AS A MAINSTREAM INFORMATION COUNTRY IS LIKELY TO OFFEND IN THIS WAY, IT IS IMPORTANT TO LOOK SPECIAL. IT IS IMPORTANT TO LOOK SPECIAL ISSUE OF Cyber SECURITY, ESPECIALLY AT A NATIONAL APPLICATION BECAUSE OF THE COUNTRY'S INFRASTRUCTURE HAS BEEN IN THIS SPACE AND DOWNTIME SECURITY THREAT TO N THIS PAPER EXAMINES THE DIFFERENT APPROACHES SECURITY USING ANALYTICAL METHODS (SOMETIMES SOFT AND SOMETIMES HARDWARE) ADDRESS. THE STUDY SHOW THAT THE HARDWARE CAN BE CONNECTED TO WITH ASPECTS OF ACCESSIBILITY TO THE TARGET BY INFLUENCING THE BEHAVIOR OF OTHERS ARE ATIONAL SECURITY COUNTRY AND THE NATURE AND BEHAVIOR OF RESOURCES IS STRICT SECURITY SO THAT POWER CAN FORCE ORDER IS BASED ON THE THREAT SOFTWARE INCLUDES THE ABILITY TO OBTAIN FAVORABLE INTEREST THROUGH ATTRACTION RATHER THAN THROUGH COERCION.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 192

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Writer: 

FOROOZANFAR MEHDI

Issue Info: 
  • Year: 

    2016
  • Volume: 

    2
Measures: 
  • Views: 

    302
  • Downloads: 

    216
Abstract: 

COUNTRIES ARE NOT ADDICTED TO OIL, “BUT THEIR INDUSTRIES ARE.” THIS PITHY ASSESSMENT UNDERSCORES THE MODERN WORLD’S DEPENDENCE ON OIL AND ILLUSTRATES WHY THE INDUSTRY’S SECURITY IS CRITICAL TO THE SECURITY OF EVERY NATION. FROM MILITARY AGGRESSION TO Cyber THREATS, THE OIL AND GAS SECTOR IS A HIGH PROFILE TARGET FOR ADVERSARIES’ INTENT ON DISRUPTING PRODUCTION, INTERCEPTING SENSITIVE DATA, AND CRIPPLING NATIONAL AND GLOBAL ECONOMIES.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 302

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 216
Issue Info: 
  • Year: 

    2012
  • Volume: 

    15
  • Issue: 

    2 (56)
  • Pages: 

    167-196
Measures: 
  • Citations: 

    0
  • Views: 

    8581
  • Downloads: 

    0
Abstract: 

This article tries to explain effects of Cyber threats on national security. Authors claim that Cyber threats has raised phenomenon of power dispersion which enables small states to exercise their authority, and enables new actors like corporations, organized groups and individuals, to participate in globalised power equations. So they argue that, Cyber threat has influences on national security in aspects of: concept of security, state-centrism in security, geographical aspect of threats, diffusion of vulenerabilities, diversity of actors in security field and way of confronting threats.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 8581

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Issue Info: 
  • Year: 

    2021
  • Volume: 

    18
  • Issue: 

    1 (69)
  • Pages: 

    139-156
Measures: 
  • Citations: 

    0
  • Views: 

    367
  • Downloads: 

    0
Abstract: 

Cyber security has become a major problem in the world, and ASEAN has taken urgent steps to address Cybersecurity. Security measures and other efforts to combat Cyber incidents at the regional and national levels demonstrate ASEAN's awareness of the importance of a robust Cyber approach that can be achieved by examining Cyber security indicators with defense issues. Defense against innovative Cyber-attacks, strategies against Cyber security threats, government policies and protection of privacy, protection of computer infrastructure in government and legal and ethical issues in Cyberspace are the objectives of this research with a descriptive-analytical approach. It comes to mind that the ASEAN countries have based their Cyber security study axes on achieving a robust Cyber approach, and how much research has been done on these indicators so far? The findings show that there has been limited research on Cybersecurity research indicators, particularly government policies and privacy protection in some ASEAN countries, which is directly related to the increase in Cybercrime.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 367

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    6
  • Issue: 

    1
  • Pages: 

    63-69
Measures: 
  • Citations: 

    0
  • Views: 

    29
  • Downloads: 

    4
Abstract: 

Considering the nature of Cyberspace as the main information base of the country and the possibility of harming it is very likely, it is necessary to take a special look at the issue of Cyberspace security, especially at the level of national applications, because the main infrastructure of the country is located in this space. The emergence of any security problem will cause a serious threat to the national security of the country. Therefore, in this research, Cyber defense in the social security organization was investigated by aiming to rank the factors affecting Cyber security among the employees of the social security organization of Shiraz City in 2023, one of the country's largest organizations. The research findings indicated that six factors of budgeting and awareness, security behavior and understanding, employee position, capacity building, inefficient human resources, and information protection culture are effective on Cyber security, among which the most important factors are inefficient human resources, Employee position, and information protection culture. Therefore, attention to these factors is recommended to the relevant officials, and it is suggested to hold training classes to inform and empower the personnel in this area.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 29

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 4 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    6
  • Issue: 

    2
  • Pages: 

    77-83
Measures: 
  • Citations: 

    0
  • Views: 

    25
  • Downloads: 

    121
Abstract: 

Security is the most basic need of any society and the most important factor for the sustainability of social life; therefore, it has been the focus of experts and theorists since the distant past. The spread of the Internet, new information and communication technologies, and the communication revolution have created a new type of virtual communication devoid of the spirit that governs real social relations. This has caused the emergence and formation of Cyberspace parallel to the real world and has disrupted the equations and patterns of traditional communication, production, transfer, and consumption of information and has caused a global movement in the field of communication and transfer of content and communication messages in the fastest possible time. Therefore, as human life is mixed with the Cyber revolution, Cyber security has come. Cyber security is security in the infrastructure and information arteries, and creating new opportunities for jobs and countries in the environment of automation, electronic commerce, exchange, and cooperation has led to targeted production, storage, and exploitation of sensitive and vital information. In general, different aspects of citizens' lives are mixed with Cyberspace, and any instability, insecurity and challenges in this space directly affect different aspects of citizens' lives, especially their security.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 25

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 121 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Rasaneh

Issue Info: 
  • Year: 

    621
  • Volume: 

  • Issue: 

  • Pages: 

    69-97
Measures: 
  • Citations: 

    0
  • Views: 

    869
  • Downloads: 

    0
Abstract: 

Due to growing use of the Cyberspace in today's world, both at the macro level (governmental and administration) and at the micro one (inter-citizenship), one of the most important tasks of the legislators in this respect, is to provide security, both civil and criminal. Undoubtedly, committing of a crime or any other wrongdoing, in this Cyberspace, is changing daily with the growth of technology. Sometimes, there is no proportionality between the crime committed and the punishment imposed, and that’ s why the offender, by evaluating his what he/she achieves by his wrongdoing in this Cyberspace and the extent of punishment foreseen for a specific committed crime, commits the intended crime. Given that delinquent behavior in this space, can lead to insecurity, in both levels of major governmental infrastructures and users’ security. Meanwhile, no mechanism different from civil liability determined for crimes committed in real space, for wrongdoings in Cyberspace by the Legislation so far, it seems that providing a strategy, to update some articles of the Cybercrime law, according to the requirements of the day, can significantly increase the security in Cyberspace.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 869

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    48
  • Issue: 

    1
  • Pages: 

    27-46
Measures: 
  • Citations: 

    0
  • Views: 

    2723
  • Downloads: 

    0
Abstract: 

The expansion and influence of ICTs and the subsequent emergence of Cyber space has made fundamental changes in all aspects of human life, including the national security of societies. Cyberspace with its unique features by the means of information exchange technology had put challenges to national security whose protection is traditionally difficult and inadequate. Although criminal proceedings against these crimes are inevitable, given the reactivity of this act and its adoption after the offense, it cannot undermine the harmful effects of these crimes. Instead, it seems that preventive criminal policy, in the form of social prevention can be considered as the most effective strategy to deal with these new threats. This article by a descriptive analytical method, identifies Cybercrime crimes and examines social prevention programs for dealing with Cybercrime against national security. The outcome of this study is to identify and validate the implementation of this preventive model.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2723

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Haghi Majid

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    277-309
Measures: 
  • Citations: 

    0
  • Views: 

    242
  • Downloads: 

    0
Abstract: 

The intensity of the changes in Cyberspace and its according diversity of insecurity and the need to respond to the current threats of this space, especially the strategic position of the services and information available in this space, have necessitated the need for a model for strategic Management of this space's security. On the other hand, having environmental information, both indoor and outdoor, especially with regard to the speed of their changes and the need for accurate information, allows us to manage security in the bigdata of this space. Understanding the environment for selecting the right strategies in all strategic Management models is part of the model. Cyber-space bigdata, in addition to providing real-time Cyber-space information, enables complete assessment and identification of the environment. In this study, the final model was implemented using ISO 31000 standard framework. In this standard, the risk assessment section was extracted with regard to the macro features of the data available in Cyberspace. The risk values in each of the extracted components of Cyberspace security by using Bayesian conditional probability functions and using Poisson distribution modulated Markov model by combining Markov cycle with Poisson probability density function and its conditional functions in Bayesian network, Extracted from large Cyberspace data, risk assessment was performed. The implementation of ISO 31000 standard was also completed in the formulation of risk Management strategies by applying elements extracted from studies on strategic Management and risk Management models. Finally, the model is simulated with an example of a Cyber threat scenario on social networks.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 242

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button