Developing cyber defense strategies against future enemy threats on the horizon of 1405
Cyber threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymi...
| Published in: | آیندهپژوهی دفاعی |
|---|---|
| Main Author: | Mohammad Sepehri |
| Format: | Article |
| Language: | English |
| Published: |
Command and Staff University
2022-02-01
|
| Subjects: | |
| Online Access: | http://www.dfsr.ir/article_249587_a0614e880c7ce5b977484d7b7ee37d35.pdf |
Similar Items
CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS
by: Constantin MINCU
Published: (2016-06-01)
by: Constantin MINCU
Published: (2016-06-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Cyber Security Threats to Iran and its Countermeasures: Defensive and Offensive Cyber Strategies
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
by: Alfan Presekal, et al.
Published: (2024-01-01)
by: Alfan Presekal, et al.
Published: (2024-01-01)
The conceptual model of the country's cyber defense ecosystem
by: alireza keramatipour, et al.
Published: (2024-09-01)
by: alireza keramatipour, et al.
Published: (2024-09-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways
by: Suleman Ashraf, et al.
Published: (2021-09-01)
by: Suleman Ashraf, et al.
Published: (2021-09-01)
Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment
by: Putnik Nenad, et al.
Published: (2017-01-01)
by: Putnik Nenad, et al.
Published: (2017-01-01)
Problems of Russia's Cyber-Security in the Arctic
by: Yu. F. Lukin
Published: (2020-05-01)
by: Yu. F. Lukin
Published: (2020-05-01)
Cyber Security and Impact on Computer Crimes
by: Andrei Pântea
Published: (2022-10-01)
by: Andrei Pântea
Published: (2022-10-01)
Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks
by: Chinthamu Narender, et al.
Published: (2025-01-01)
by: Chinthamu Narender, et al.
Published: (2025-01-01)
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
by: Ricardo M. Czekster, et al.
Published: (2022-05-01)
by: Ricardo M. Czekster, et al.
Published: (2022-05-01)
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
by: Ming Ni, et al.
Published: (2021-01-01)
by: Ming Ni, et al.
Published: (2021-01-01)
IMPLEMENTATION OF INTERNATIONAL CYBER SECURITY STANDARDS IN THE NATIONAL LEGISLATION OF UKRAINE
by: Iulia DERKACHENKO, et al.
Published: (2021-09-01)
by: Iulia DERKACHENKO, et al.
Published: (2021-09-01)
Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
by: Sanjay Goel, et al.
Published: (2021-01-01)
by: Sanjay Goel, et al.
Published: (2021-01-01)
The rise of cyber power in Brazil
by: Joe Devanny, et al.
Published: (2022-09-01)
by: Joe Devanny, et al.
Published: (2022-09-01)
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
by: Mary Nankya, et al.
Published: (2023-10-01)
by: Mary Nankya, et al.
Published: (2023-10-01)
An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics
by: Marshall S. Rich, et al.
Published: (2024-03-01)
by: Marshall S. Rich, et al.
Published: (2024-03-01)
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)
by: A. V. Vasilyev
Published: (2023-11-01)
CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
by: Ovidiu MOȘOIU, et al.
Published: (2020-03-01)
by: Ovidiu MOȘOIU, et al.
Published: (2020-03-01)
Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius
by: Johannes Thumfart
Published: (2020-09-01)
by: Johannes Thumfart
Published: (2020-09-01)
The Legality of Devious Cyber Practices: Readiness of Indonesia's Cyber Laws
by: Sardjana Orba Manullang
Published: (2022-12-01)
by: Sardjana Orba Manullang
Published: (2022-12-01)
Keamanan Nasional dalam Menghadapi Perubahan Cyber Warfare
by: Elfirda Putri, et al.
Published: (2023-12-01)
by: Elfirda Putri, et al.
Published: (2023-12-01)
Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension
by: Khodadad Halili, et al.
Published: (2024-12-01)
by: Khodadad Halili, et al.
Published: (2024-12-01)
Cyber Threats for Organizations of Financial Market Infrastructures
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
by: Ali Shan, et al.
Published: (2024-07-01)
by: Ali Shan, et al.
Published: (2024-07-01)
Criminological Aspects of Current Cyber Security
by: Andrejs Vilks, et al.
Published: (2022-10-01)
by: Andrejs Vilks, et al.
Published: (2022-10-01)
Cyber-defense: Quo vadis?
by: Vernez Gerald
Published: (2015-01-01)
by: Vernez Gerald
Published: (2015-01-01)
Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure
by: Amir Djenna, et al.
Published: (2021-05-01)
by: Amir Djenna, et al.
Published: (2021-05-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
Modeling and Simulation of Cyber Battlefield
by: AliJabar Rashidi, et al.
Published: (2017-12-01)
by: AliJabar Rashidi, et al.
Published: (2017-12-01)
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
Cyber hygiene of the digital twin of the civil aviation occupational safety management system in the context of quantum transformation
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
Establishment of The Cyber Diplomacy Toolbox (CDT) as a Joint Diplomatic Response to the European Union Against the Threat of Cyber Attack activity
by: Miftahul Khausar, et al.
Published: (2023-03-01)
by: Miftahul Khausar, et al.
Published: (2023-03-01)
Establishment of UN Cyber Peacekeeping Force: Prospects and Challenges
by: Fahad Nabeel
Published: (2019-07-01)
by: Fahad Nabeel
Published: (2019-07-01)
Cyber security in the Gulf Cooperation Council states Froma Contenmporary geopolitical perspective
by: Ahmed.H. A, et al.
Published: (2020-09-01)
by: Ahmed.H. A, et al.
Published: (2020-09-01)
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
by: Suhyeon Lee, et al.
Published: (2022-01-01)
by: Suhyeon Lee, et al.
Published: (2022-01-01)
Similar Items
-
CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS
by: Constantin MINCU
Published: (2016-06-01) -
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01) -
Cyber Security Threats to Iran and its Countermeasures: Defensive and Offensive Cyber Strategies
by: Syed Qandil Abbas, et al.
Published: (2024-07-01) -
THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01) -
Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
by: Alfan Presekal, et al.
Published: (2024-01-01)
