Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare

Hybrid wars are the wars of the Third World and armed groups, which, due to weakness in many areas, try to combine national capabilities with a view to confronting superior powers. Given the fact that AJA uses cyberspace in data technology and extensive exploitation information, there is no specifi...

Full description

Bibliographic Details
Main Authors: Rahim Bahari, davod azar
Format: Article
Language:English
Published: AJA Command and Staff University 2018-11-01
Series:علوم و فنون نظامی
Subjects:
Online Access:http://www.qjmst.ir/article_34520_05c8dc6d9c222145bd38de98b59667ea.pdf
_version_ 1818897551277948928
author Rahim Bahari
davod azar
author_facet Rahim Bahari
davod azar
author_sort Rahim Bahari
collection DOAJ
description Hybrid wars are the wars of the Third World and armed groups, which, due to weakness in many areas, try to combine national capabilities with a view to confronting superior powers. Given the fact that AJA uses cyberspace in data technology and extensive exploitation information, there is no specific system for monitoring cyberspace and the implementation of comprehensive, safe and sustainable systems for effective implementation of AJA missions. There are many ambiguities in this area. The identification and monitoring of the necessary mechanisms and schemescan help to organize and manage it in the production and exchange of information in a secure environment. The researcher in this research (Monitoring Operation of the Armed Forces of the Islamic Republic of Iran (AJA) in Hybrid War as a Function Variable) and factors such as (Mechanisms and schemes) as a factor affecting the main function of the survey and research and 103 individuals have been selected. In order to collect information, tools such as interviews, questionnaires and study documents The documents were used, the findings were analyzed using content analysis, trend analysis, descriptive and inferential statistics, and finally analyzed in mixed form. The results of the hypotheses indicate that the AJA cyberspace monitoring operation is very effective in the Hybrid War, as well as monitoring TCP and UDP ports, Network acceptance, recruiting specialist and committed people, localizing applications and software, and securing active and passive network equipment; those that have the greatest impact on their monitoring operations in Hybrid war.
first_indexed 2024-12-19T19:17:58Z
format Article
id doaj.art-40df40a4c8b04c1aa800ad5016234c6e
institution Directory Open Access Journal
issn 2008-191X
2676-4520
language English
last_indexed 2024-12-19T19:17:58Z
publishDate 2018-11-01
publisher AJA Command and Staff University
record_format Article
series علوم و فنون نظامی
spelling doaj.art-40df40a4c8b04c1aa800ad5016234c6e2022-12-21T20:09:05ZengAJA Command and Staff Universityعلوم و فنون نظامی2008-191X2676-45202018-11-011445537434520Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid WarfareRahim Bahari0davod azar1studentteacherHybrid wars are the wars of the Third World and armed groups, which, due to weakness in many areas, try to combine national capabilities with a view to confronting superior powers. Given the fact that AJA uses cyberspace in data technology and extensive exploitation information, there is no specific system for monitoring cyberspace and the implementation of comprehensive, safe and sustainable systems for effective implementation of AJA missions. There are many ambiguities in this area. The identification and monitoring of the necessary mechanisms and schemescan help to organize and manage it in the production and exchange of information in a secure environment. The researcher in this research (Monitoring Operation of the Armed Forces of the Islamic Republic of Iran (AJA) in Hybrid War as a Function Variable) and factors such as (Mechanisms and schemes) as a factor affecting the main function of the survey and research and 103 individuals have been selected. In order to collect information, tools such as interviews, questionnaires and study documents The documents were used, the findings were analyzed using content analysis, trend analysis, descriptive and inferential statistics, and finally analyzed in mixed form. The results of the hypotheses indicate that the AJA cyberspace monitoring operation is very effective in the Hybrid War, as well as monitoring TCP and UDP ports, Network acceptance, recruiting specialist and committed people, localizing applications and software, and securing active and passive network equipment; those that have the greatest impact on their monitoring operations in Hybrid war.http://www.qjmst.ir/article_34520_05c8dc6d9c222145bd38de98b59667ea.pdf"hybrid warfare""cyber space""monitoring operations"
spellingShingle Rahim Bahari
davod azar
Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
علوم و فنون نظامی
"hybrid warfare"
"cyber space"
"monitoring operations"
title Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
title_full Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
title_fullStr Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
title_full_unstemmed Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
title_short Operation of Monitoring the Cyberspace of the Army of the Islamic Republic of Iran in Hybrid Warfare
title_sort operation of monitoring the cyberspace of the army of the islamic republic of iran in hybrid warfare
topic "hybrid warfare"
"cyber space"
"monitoring operations"
url http://www.qjmst.ir/article_34520_05c8dc6d9c222145bd38de98b59667ea.pdf
work_keys_str_mv AT rahimbahari operationofmonitoringthecyberspaceofthearmyoftheislamicrepublicofiraninhybridwarfare
AT davodazar operationofmonitoringthecyberspaceofthearmyoftheislamicrepublicofiraninhybridwarfare