Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare

Hybrid wars are the wars of the Third World and armed groups, which, due to weakness in many areas, try to combine national capabilities with a view to confronting superior powers. Given the fact that AJA uses cyberspace in data technology and extensive exploitation information, there is no specifi...

Full description

Bibliographic Details
Main Authors: Rahim Bahari, davod azar
Format: Article
Language:English
Published: AJA Command and Staff University 2018-11-01
Series:علوم و فنون نظامی
Subjects:
Online Access:http://www.qjmst.ir/article_34520_05c8dc6d9c222145bd38de98b59667ea.pdf
Description
Summary:Hybrid wars are the wars of the Third World and armed groups, which, due to weakness in many areas, try to combine national capabilities with a view to confronting superior powers. Given the fact that AJA uses cyberspace in data technology and extensive exploitation information, there is no specific system for monitoring cyberspace and the implementation of comprehensive, safe and sustainable systems for effective implementation of AJA missions. There are many ambiguities in this area. The identification and monitoring of the necessary mechanisms and schemescan help to organize and manage it in the production and exchange of information in a secure environment. The researcher in this research (Monitoring Operation of the Armed Forces of the Islamic Republic of Iran (AJA) in Hybrid War as a Function Variable) and factors such as (Mechanisms and schemes) as a factor affecting the main function of the survey and research and 103 individuals have been selected. In order to collect information, tools such as interviews, questionnaires and study documents The documents were used, the findings were analyzed using content analysis, trend analysis, descriptive and inferential statistics, and finally analyzed in mixed form. The results of the hypotheses indicate that the AJA cyberspace monitoring operation is very effective in the Hybrid War, as well as monitoring TCP and UDP ports, Network acceptance, recruiting specialist and committed people, localizing applications and software, and securing active and passive network equipment; those that have the greatest impact on their monitoring operations in Hybrid war.
ISSN:2008-191X
2676-4520