Conceptual model of cyber warfare preparedness of the Armed Forces of the Islamic Republic of Iran

Document Type : Research Paper

Author

research team

Abstract

Planning to maintain and increase the readiness of cyber warfare, due to its important role in increasing the deterrent power of the Islamic Republic of Iran, is a definite and inevitable necessity of the Armed Forces.

The aim of this study was to identify the necessary and effective dimensions and criteria in cyber warfare preparation. Therefore, this research is a descriptive-survey in terms of applied purpose and in terms of data collection. The method of this qualitative-quantitative research (mixed) and its statistical population includes experts in relation to the subject of this research, which can be called university professors, managers and professional experts at the staff and operational levels;In the sampling stage, the snowball method was used to conduct the interview and the questionnaire. And 10 successful interviews were registered. In the questionnaire section, 30 people from the statistical population were selected to answer the researcher-made questionnaire. Coding method was used for interview analysis and non-parametric statistical methods were used for questionnaire analysis.According to the research findings, the effective components on cyber warfare preparedness can be classified into 4 dimensions: cyber warfare platform, cyberwarfare actors, cyberfight planning and method, and performance of cyber command and management style.

Keywords

Main Subjects


  • فهرست منابع و مآخذ

    الف. فارسی

    • اکبری، حمید و همکاران(1398). آگهی وضعیتی حملات منع خدمات توزیع شده بر اساس پیش بینی صحنه نبرد، نشریه علمی پدافند الکترونیکی و سایبری، شماره 1 صص 94-77
    • تقی پور، رضا و همکاران (1398). الگوی راهبردی حفاظت سایبری از زیر ساخت های اطلاعاتی حیاتی ج.ا.ا، فصلنامه علمی امنیت ملی، سال نهم، شماره 34، صص 48-7
    • سند راهبردی پدافند سایبری کشور (1394). سازمان پدافند غیرعامل کشور
    • شهیر، احسان و همکاران (1396). طراحی الگوی راهبردی بومی امنیت فضای مجازی کشور، رساله دکتری، دانشگاه عالی دفاع ملی، دانشکده امنیت ملی
    • نای، جوزف، (1390). آینده قدرت، ترجمه صحرایی، رضا مراد ،حروفیه ،تهران
    • نصرت آبادی، جمشید و همکاران،(1398). الگوی ارزیابی قدرت سایبری نیروهای مسلح جمهوری اسلامی ایران، رساله دکتری، دانشگاه عالی دفاع ملّی، دانشکده امنیت ملی
    • نوذری، فضل الله(1389). مفاهیم آمادگی رزمی و اصول جنگ، چاپ اول، تهران، دانشکده و پژوهشکده علوم دفاعی
    • هلیلی، خداداد و همکاران(1397). ارائه الگوی راهبردی ارتقاء قدرت سایبری ج.ا.ا در تراز جهانی، رساله دکتری، دانشگاه عالی دفاع ملی، دانشکده امنیت ملی

    ب.  انگلیسی

    • Adrian Venables, siraj Ahmed sheikh andjames shuttleworth (2015). A model for characterizing cyber power 9th international conference on critical infrastructure protection (ICCIP).
    • Andress، ، & Winterfeld، S. (2013). Cyber warfare: techniques،3. tactics and tools for security practitioners: Elsevier.
    • FFIEC, (2015), FFIEC Cybersecurity Assessment Tool. Appendix C: Glossary, pp 1-38.
    • Euisun Paik, Heung Youl Youm, (2015), “ Knowledge Sharing Series  Cybersecurity”, APCICT Publication, PP 1-108
    • Ugur Akyazi, (2014), “Possible Scenarios and Maneuvers for Cyber Operational Area”, 13th European Conference on Cyber Warfare and Security - Cryptome, PP15-21.
    • D. Allen, “Information operations planning,” Artech House, 2017.
    • Training and Doctrine Command (TRADOC) Pamphlet 525-7-8, "The U.S Army Concept Capability Plan for Cyberspace Operation (CyberOps)" 2016-2028, February  2010
    • Eastwest Institute and the Information Security Institute of Moscow State University, "Russia-U.S. Bilateral on cybersecurity - critical terminology foundations", Issue I, April 2011
    • Carlisle Barracks, "U.S Army war college guide to national security issues", Volume I: Theory of war and strategy , 5th Edition, June 2012
    • NATO Cooperative Cyber Defence Centre of Excellence, "National Cyber Security Framework Manual", 2012, PP 8-19
    • UK Cabinet Office, "The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world", November 2011
    • The White House, "Cyberspace Policy Review: Assuring a Trusted and Ressilient Information and Communications Infrastructure", May 2009
    • oint Chiefs of Staff, "Joint Publication 3-12: Cyberspace Operations", 2013
    • David Clark, " Characterizing,cyberspace:,past,,present,and,future", 2010