دوره 9، شماره 33 - ( 5-1398 )                   جلد 9 شماره 33 صفحات 0-0 | برگشت به فهرست نسخه ها

XML English Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Omrani M, Shafiee M, Khorsandi S. Cyber Threats Foresight Against Iran Based on Attack Vector. فصلنامه فناوری اطلاعات. 2019; 9 (33)
URL: http://jor.iranaict.ir/article-1-1448-fa.html
عمرانی مهدی، شفیعی مسعود، خرسندی سیاوش. Cyber Threats Foresight Against Iran Based on Attack Vector. فصلنامه فناور اطلاعات و اتباطات ایران. 1398; 9 (33)

URL: http://jor.iranaict.ir/article-1-1448-fa.html


چکیده:   (526 مشاهده)
Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level
متن کامل [PDF 497 kb]   (209 دریافت)    
نوع مطالعه: پژوهشي | موضوع مقاله: فناوری اطلاعات و ارتباطات
دریافت: ۱۳۹۸/۵/۲۷ | پذیرش: ۱۳۹۸/۵/۲۷ | انتشار: ۱۳۹۸/۵/۲۷

ارسال نظر درباره این مقاله : نام کاربری یا پست الکترونیک شما:
CAPTCHA

کلیه حقوق این وب سایت متعلق به می باشد.

طراحی و برنامه نویسی : یکتاوب افزار شرق

© 2025 All Rights Reserved |

Designed & Developed by : Yektaweb