Defensive Future Studies

Defensive Future Studies

Security pattern in the cyberspace of the Islamic Republic of Iran with a futuristic approach

Document Type : Original Article

Authors
1 Ms.c in the founder of the virtual science research group Tedbir
2 Faculty member of Army Staff and Command University
Abstract
It is impossible to deal with cyber threats in order to eliminate them completely. Therefore, the main objective of this research is to explore the scientific community's understanding of the current state of the cyberspace and provide a model for improving the security of the space. The purpose of this research is of the type of developmental research. In terms of approach, it is a kind of qualitative research of the future research that was identified by environmental monitoring of information related to the subject and combined with the further method of the findings, and eventually Using the grounded theory, the output theory is presented in the framework of the model. The main source for collecting data from this research is the available documents (books, previous studies, and related materials in related meetings and conferences). In order to evaluate the validity and reliability of the model, the focus groups and Kappa index were used. The results of the research indicate that because of the great impact and ease and simplicity of the application and variety of tools and methods, the cyber threat is decisive and should be addressed through cultural development, infrastructure development, non-cyber defense, technical measures and physical security, and The management arrangements will provide a genuine change in cyberspace to achieve cybercrime independence.
Keywords

  •  

    • Bass, T. & Lt.Col.Glenn, W. (2015). A Simple Framework For Filtering Queued Smtp Mail.
    • Brenner, S. W. (2006). Sybercrime, syberterrorism and Syberwarfare, International Review of Penal Law: Cybercrime, AIDPو Volume 77.
    • Colarik, A. M. (2006). Cyber Terrorism: Political and Economic Implication, Idea Group Publication.
    • Gordon, T.J. & Glenn, J.C. (2009). Environmental scanning. In: Glenn, J.C.; Gordon, T.J., eds. (2011). Futures research methodology—version 3.0 [CD-ROM].Washington, DC: The Millennium Project.-Cyber War, Methods and Practice, K.Saalbach.
    • Kuehl, D. (2009). First Battles in Cyberspace: New Paradigm for 21st Century Warfar irmcollege, National Defense University, IQPC Cyber Warfare.
    • Sadowsky, G., James X.D., Greenberg, Alan, J., Mack, B. & Schwarts, A. (2004). ITSecurity Handbook, infoDev, Worldbank.
    • Siber, U. (2010). International Legal LegalHarmonization and Cooperation against Terrorist Use of the Internet, Max Planck institute for oreign and international Criminal Law, Freiburg Germany.
    • Steele, R.D. (2011). The Asymmetric Threat, JFQ, summer-winter.