Provide a native model of cyber monitoring,monitoring and alerting based on the ooda cycle
محل انتشار: فصلنامه امنیت ملی، دوره: 10، شماره: 37
سال انتشار: 1399
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 325
فایل این مقاله در 39 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_NSJ-10-37_015
تاریخ نمایه سازی: 13 دی 1399
چکیده مقاله:
The use of cyberspace has created new challenges in the national security domain, in a way that has essentially transformed the concepts of security in all aspects of national power. These security issues have sometimes affected cyber-security systems and infrastructures, which have had a direct impact on the national security of countries in the form of cyber threats and threats, by undermining the dimensions of cyber security. Given the importance of preventing these injuries, it is necessary to take precautionary measures with respect to the hazards in question. To this end, due to the serious vacuum in deploying systems that can perform cyber-space identification and alerting activities at the right time, a model for cyber-monitoring, monitoring and alerting has been attempted based on a comparative study of structures in selected countries. Submitted in accordance with indigenous policies and regulations. According to the subject and purpose of the research, the type of research is applied development. The research methodology of the combined method includes library studies for collecting successful experiences of other countries and comparing them and then open interviews through a panel of experts in the qualitative section and then distributing the questionnaire to evaluate the components of the model presented. The statistical population of the present study was 20 experts in the field of information technology and communications and security sector of the country. In this paper, based on the compilation of the comparative study results of selected countries, a cyber-monitoring, monitoring and warning model based on the OODA(Observation, Orientation, Decision, Action) cycle has been presented and the components of the model are prioritized according to the experts' opinion, which according to their opinion, the priority of the four stages It includes observation, Orientation, action and decision making, and the most important components of cyber dimensions are cultural, defense-security, diplomacy, social, economic, science, technology, and politics, respectively.
کلیدواژه ها:
نویسندگان
mahdi sahraei
دانشجو دکتری مدیریت امنیت سایبر
mohammadreza valavi
دانشیار و عضو هیئت علمی دانشگاه صنعتی مالک
bahram bayat
دکتری جامعه شناسی، دانشگاه اصفهان، اصفهان،
Abdolreza taraghi
دانشجو دکتری مدیریت امنیت سایبر
مراجع و منابع این مقاله:
لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :