Investigating of the Cyber Power of the Armed Forces by Emphasizing the Scenario Method: Cyber - Defence Evaluating Approach
Author(s):
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
proper recognition and timely entry in new defence areas is always one of the concerns of designers and players in the field of cyber warfare. Evaluating of cyber power and identifying weaknesses and vulnerabilities in order to prevent surprises in future wars has a high degree of importance. In the present study, with a comprehensive and futuristic vision, the dimensions and components of cyber power in the field of cyber - defence of the Armed Forces were studied and scenarios were presented to evaluate the Cyber strength. The purpose of this study is to evaluate the cyber power of the Armed Forces (The cyber defence dimension). The statistical population and sample size were matched, including 20 experts in the field of cyber forces of the Armed Forces. The type of research is applied research and the method is exploratory in the first stage due to the recognition of the dimensions and components of the subject, and in the second stage, they are conducted using the futures studies and the emphasis on the scenario method. The result is that the cyber defence approach has four components, including: defence platform, cyber diplomacy, human factor and soft/hard ware. Also, the human factor component has a higher priority. It is recommended that the ICT Deputy of the Armed Forces the cyber power evaluation of the Armed Forces with emphasis on the cyber offensive dimension and in the form of a separate study is recommended.
Keywords:
Language:
Persian
Published:
Journal Defensive Future Studies, Volume:6 Issue: 20, 2021
Pages:
59 to 82
https://www.magiran.com/p2294889
سامانه نویسندگان
مقالات دیگری از این نویسنده (گان)
-
Providing a data governance model for social networks
Sasan Chamani *, Mohsen Aghayi, Sales, Mohammad Mardani
Journal of Exalted Governance, -
governance maturity model for a military organization
Sasan Chamani*, Mohsen Aghayi, Mohammad Mardani,
Journal of Command and Control Communications Computer Intelligence,