Developing cyber defense strategies against future enemy threats on the horizon of 1405

Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymi...

Full description

Bibliographic Details
Main Author: Mohammad Sepehri
Format: Article
Language:English
Published: Command and Staff University 2022-02-01
Series:آینده‌پژوهی دفاعی
Subjects:
Online Access:http://www.dfsr.ir/article_249587_a0614e880c7ce5b977484d7b7ee37d35.pdf
_version_ 1811161253239848960
author Mohammad Sepehri
author_facet Mohammad Sepehri
author_sort Mohammad Sepehri
collection DOAJ
description Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymity, borderlessness, chaos and its combination with other dimensions of warfare, compared to other operational environments, have unique features. The main purpose of this article is to achieve the country's cyber defense strategies against the enemy's cyber threats in the horizon of 1405. Deals with cyber defense technologies. This applied and developmental research, its research method is mixed from case-context type, documentary data collection and survey method and its tools are interviews and statistical population of 60 people, which uses SWOT matrix to analyze indoor and outdoor environment and formulate strategies and TOPSIS software was used to determine the prioritization of the country's cyber defense strategies against the enemy cyber threats and its most important strategy is localization and smarting  of the country's cyber software and hardware systems in terms of processes, systems, standards, protocols, procedures and procedures using power and capacity. The purpose of the country's universities and research centers is to protect and increase cyber deterrence against enemy threats and cyber attacks.
first_indexed 2024-04-10T06:11:28Z
format Article
id doaj.art-2451a73dfdcf49c18bc1300d9de5bf94
institution Directory Open Access Journal
issn 2588-428X
2645-7172
language English
last_indexed 2024-04-10T06:11:28Z
publishDate 2022-02-01
publisher Command and Staff University
record_format Article
series آینده‌پژوهی دفاعی
spelling doaj.art-2451a73dfdcf49c18bc1300d9de5bf942023-03-02T12:31:12ZengCommand and Staff Universityآینده‌پژوهی دفاعی2588-428X2645-71722022-02-0162315317610.22034/dfsr.2022.539210.1541249587Developing cyber defense strategies against future enemy threats on the horizon of 1405Mohammad Sepehri0Assistant Prof. Khatam-Ol-Anbiya Air Defense UniversityCyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymity, borderlessness, chaos and its combination with other dimensions of warfare, compared to other operational environments, have unique features. The main purpose of this article is to achieve the country's cyber defense strategies against the enemy's cyber threats in the horizon of 1405. Deals with cyber defense technologies. This applied and developmental research, its research method is mixed from case-context type, documentary data collection and survey method and its tools are interviews and statistical population of 60 people, which uses SWOT matrix to analyze indoor and outdoor environment and formulate strategies and TOPSIS software was used to determine the prioritization of the country's cyber defense strategies against the enemy cyber threats and its most important strategy is localization and smarting  of the country's cyber software and hardware systems in terms of processes, systems, standards, protocols, procedures and procedures using power and capacity. The purpose of the country's universities and research centers is to protect and increase cyber deterrence against enemy threats and cyber attacks.http://www.dfsr.ir/article_249587_a0614e880c7ce5b977484d7b7ee37d35.pdf"cyber attackcyber defensecyber warfarecyber supportcyber threats"
spellingShingle Mohammad Sepehri
Developing cyber defense strategies against future enemy threats on the horizon of 1405
آینده‌پژوهی دفاعی
"cyber attack
cyber defense
cyber warfare
cyber support
cyber threats"
title Developing cyber defense strategies against future enemy threats on the horizon of 1405
title_full Developing cyber defense strategies against future enemy threats on the horizon of 1405
title_fullStr Developing cyber defense strategies against future enemy threats on the horizon of 1405
title_full_unstemmed Developing cyber defense strategies against future enemy threats on the horizon of 1405
title_short Developing cyber defense strategies against future enemy threats on the horizon of 1405
title_sort developing cyber defense strategies against future enemy threats on the horizon of 1405
topic "cyber attack
cyber defense
cyber warfare
cyber support
cyber threats"
url http://www.dfsr.ir/article_249587_a0614e880c7ce5b977484d7b7ee37d35.pdf
work_keys_str_mv AT mohammadsepehri developingcyberdefensestrategiesagainstfutureenemythreatsonthehorizonof1405