Vulnerability Assessment Model for Network-Centric Operation Based on Hierarchal Analysis Process

Message:
Abstract:
The prediction of future battles is a subject that has been debated between theorists for decades . According to them, this battlefield is network-based, complex, non-linear, dynamic, and in an uncertain environment. Since, based on the theory of complexity and chaos, minor problems can have destructive effects in this complex environment, its evaluation of damage is a research necessity. The research methodology is based on document analysis and library study to extract the damage and assessment criteria. Then, based on the hierarchical analysis process, we present a model for assessing and ranking the network-based operation damages. Vulnerability assessment criteria are time, cost, effectiveness, and feasibility, for evaluating vulnerabilities for effective use.Based on evaluation criteria, electronic warfare, technology and command vulnerabilities are the top priority for use. Vulnerabilities, such as electronic warfare, technology and human resources are with the highest rating in terms of time. Based on cost, network and communications, technology and electronic warfare vulnerabilities have the highest priority and command vulnerabilities such as erosion of the war and over loading information have the lowest cost rating. The most effective vulnerability of science progress includes theories of complexity, chaos and system theory .The least-effective vulnerability is due to technology. Based on feasibility criteria, command damage, and information risk have the highest rank, which can be achieved with psychological and cognitive operations. The threats of information deception and the development of science were the lowest rank.
Language:
Persian
Published:
Journal of Command and Control Communications Computer Intelligence, Volume:2 Issue: 1, 2018
Page:
109
https://www.magiran.com/p1923653