designating a hybrid model for IT emergency response team of defense sectors

Document Type : Original Article

Authors

1 Malek Ashtar University

2 p.h.d. of sndu

3 teacher of university

Abstract

Today, with the growth and development of information technology, the infrastructure and information systems of defense sectors are also built on the basis of information technology; In such a way that due to negligence and failure to take care of the network, the possibility of loss of information and assets will be imagined; In order to respond to incidents in the shortest possible time, it is necessary to set up a Ict response team in defense centers; So that the network can be controlled in a reliable platform and unauthorized attacks and intrusions can be detected and the response speed can be increased in the shortest possible time with optimal communication between components; On the other hand, maintaining hierarchy and agility and using real-time systems is one of the distinctions of this team compared to non-defensive teams; In this research, by relying on the library method, the required data was extracted, and with the opinion of experts in the field of cyber defense, questions were prepared and distributed among 65 experts of the target community; The results of this analysis using spss software were presented as research results and a coordinating model was proposed for the command center and a hybrid model (distributed and centralized) was proposed for the lower layers; Also, the manner of interactions, services, the amount of authority, the method of reporting, and the organizational chart were presented

Keywords


  • 13- فهرست منابع و مآخذ

    • رشتی، سید محمدرضا. (1388). راهنمای ایجاد یک تیم پاسخ­گویی به رخدادهای امنیتی رایانه‏ای CSIRT. تهران: رویش جوانه­های فردا.
    • سازمان پدافند غیرعامل کشور. (1393). «بررسی و ارزیابی ریسک­ها و مخاطرات سایبری».
    • سند نظام ملی پیشگیری و مقابله با رخدادهای فضای مجازی.
    • صیاد، محمدکاظم و امینی، آرمین و طاهری، ابوالقاسم. (1399). «تهدیدات سایبری و اقدامات امنیتی در فضای مجازی» فصلنامه علمی امنیت ملی، سال دهم، شماره سی و هشتم.
    • طیرانی، احسان. (1395). مدیریت رخدادهای امنیت رایانه­ای و تشکیل تیم­های CERT سازمانی، آپای مشهد.
    • کشاورز، رضا. (1393). «ارایه الگوی استقرار CERT مراکز نظامی»، مجله علمی پژوهش­های حفاظتی.
    • علیدوستی، میترا. (1392). «بررسی الگوریتم‌ها و روش­های تست نفوذ و ارزیابی ابزارهای موجود»، پایان­نامه کارشناسی ارشد مهندسی رایانه گرایش معماری سیستم‌های رایانه، دانشگاه علم و صنعت.
    • Alberts, Chris. Dorofee, Audrey. Killcrece, Georgia. Ruefle, Robin. Zajicek, Mark. (2016). "Defining Incident Management Processes for CSIRTs: A Work in Progress". U.S: Software Engineering Institute, Carnegie Mellon University.
    • Brownlee, N. (2018). "Expectations for Computer Security Incident Respons". U.S: Software Engineering Institute, Carnegie Mellon University.
    • Blueprint for a Secure Cyber Future: )2017(The Cybersecurity Strategy forthe Homeland Security Enterprise NIST Incident Response, 2021, The step bysetp guide for incident response reporting.
    • DOD Faces Challenges In Its Cyber Activities, July (2017)
    • John Franco Dept, (2017) Cyber Defense Overview Electrical Engineering and Computing Science.
    • Killcrece, Georgia. Kossakowski, Klaus-Peter. Ruefle, Robin. Zajicek, Mark. (2016) "State of the Practice of Computer Security Incident Response Teams (CSIRTs)". US: Carnegie Mellon University.
    • Kossakowski, Klaus-Peter, Robin Ruefle,Mark Zajicek". (2017).Organizational Models for Computer Security Incident ResponseTeams (CSIRTs)". US: Software Engineering Institute, Carnegie Mellon University.
    • Martijn van der heide (2017), Management strategies for implementing forensic security measures
    • Penedo, David. (2016). "Technical Infrastructure of a CSIRT". Cote d'Azur: Internet Surveillance and Protection, ICISP." US: Software Engineering Institute, Carnegie Mellon University.
    • Sally Brice-O Hara, Coast Guard IntelligenceJan, )2017(.
    • Scarfone, Karen. Grance, Tim and Masone, Kell. (March 2018). "Computer Security Incident Handling Guide". U.S: Department of Commerce, National Institute of Standards and Technology.

     

    • سایت اینترنتی تیم پاسخ­گویی فوریتی مرکز ماهر
    • سایت اینترنتی پلیس فتا