Cyber Power Strategies of the Army of the Islamic Republic of Iran

Document Type : Original Article

Authors

1 Faculty Member of AJA Command and Staff University, Tehran, Iran.

2 Assistant Prof. AJA Command and Staff University, Tehran, Iran.

Abstract

From a military point of view, cyber power is perhaps the most important emerging tool of the past few decades. Currently, most of the armed forces of the countries are preparing to secure their cyber and cyber borders against such a new development. New military manuals are compiled based on cyberspace. In all levels of conflict, from internal rebellions to conventional war, cyber power is an inevitable factor of military capabilities, this capability is formed on the basis of modern technologies. Cyber ​​centers are an important organization in the military structure of the Islamic Republic of Iran Army, and the results of its performance will play a vital role in the performance and efficiency of the army. Therefore, determining their performance based on new strategies is one of the important duties of the supreme commanders of the armed forces. This research was done with the aim of presenting the cyber power strategies of the Islamic Republic of Iran Army. This research is based on an analytical-descriptive method and the use of available resources in the field of cyber power, as well as a comprehensive review using the SWOT analysis method to determine the strengths, weaknesses, opportunities and threats, and further based on the opinion of experts and The interviewees determined the weight of each option and 15 strategies were determined as the most important cyber power strategies of the Islamic Republic of Iran Army.

Keywords

Main Subjects


  •  

     

    • Andress, Jason, Winterfeild, Steve (2011). Cyber warfare Teechniques. Tactics and Tools for Security practitioner USA.
    • Ankang, Ju, Guo and others (2019). Research Article. HeteMSD: A Big Data Analytics Framework forTargeted Cyber-Attacks Detection Using Heterogeneous Multisource Data. Zhengzhou Institute of Information Science and Technology. China.
    • Department of Army,(2017) FM 3-12, Cyberspace And Electronic Warfare Operations, Washington
    • (2018), JP 3-12, Cyberspace Operations.
    • Liivoja, Rain, Väljataga, Ann. (2021). Autonomous Cyber Capabilities under International Law, NATO CCDCOE Publications
    • Nye, Joseph S. (2010). Cyber Power (The future of power in the 21th century). MIT-Harvard Minerva Project, Harvard Kennedy School.
    • Olofintuyi, Sunday Samuel. (2021). Cyber Situation Awareness Perception Model for Computer Network, (IJACSA) International Journal of Advanced Computer Science and Applications. Vol. 12, No. 1.
    • Ph Stoecklin, Marc and others. (2018). DeepLocker: How AI Can Power a Stealthy New Breed of Malware <https: //securityintelligence. com/deeplocker-how-ai-can- power-a-stealthy-new-breed-of-malware/>.
    • Ross, Ron, and others. (2021). Developing Cyber-Resilient Systems: A Systems Security Engineering Approach. Draft NIST Special Publication800. Volume 2.
    • G, and others, (2006), “Realizing situation awareness in a cyberenvironment,” Proceedings of SPIE, Defense and Security Symposium, vol.
    • Trusilo, Daniel and Burri, Thomas. (2021). Ethical Artificial Intelligence: An Approach to Evaluating Disembodied Autonomous Systems. Autonomous Cyber Capabilities under International Law. Chapter 4. by NATO CCDCOE Publications.
    • S. AIR FORCE, (2011), DOCTRINE PUBLICATION (AFDP) 3-12 CYBERSPACE OPERATIONS.

    Zac, Rogers. (2021). The promise of strategic Gain in the Digital Information Age. THE CYBER DEFENSE REVIEW. Army Cyber Institute. 6(1).