Document Type : Original Article
Authors
1
Doctoral Degree in Strategic Management of Cyber Space Security, National Defense University (Corresponding Author)
2
Faculty member of Shahed University
Abstract
Cyber space has been tremendously progressing and has led to various activities, such as information provision, service delivery, communications management, and social, political, cultural, and governance interactions through cybersecurity mechanisms. This space is exposed to various challenges, threats and threats such as organized crime, disruptive service attacks, spyware, sabotage, data bank destruction, privacy defects, and intellectual property rights violations. Cyber security threats by exploiting the complexity and increasing connectivity of existing systems in organizations, and in particular critical, critical, and critical infrastructure, compromise the security of the economy, safety and public health. Protecting information to create a safe, secure and resilient community of cyberattacks is essential, which requires mechanisms to preserve the confidentiality, integrity and availability of assets. Considering the emergence of the concept of information security in cyberspace and considering its impact on the national security of the country, addressing this issue and institutionalizing it is considered a necessity and priority. In this regard, in order to protect the country's information in the cyberspace, there is a need for full knowledge of this space and its threats. Accordingly, the preparation of a macroeconomic model for information security in the Islamic Republic of Iran's cyberspace would help to identify the areas needed and to take the necessary steps. Information security will be the focus of this article. In order to achieve a macroeconomic model for cyberspace security, it is necessary to examine theoretical foundations, upstream documents of the country in this area. It is also necessary to study the comparative study of country documents, which are discussed in this article and based on this. Dimensions, components, subcomponents and cyber security information indicators were measured. By summarizing the research findings (theoretical foundations, comparative studies, etc.), 8 dimensions and for each dimension, 4 components, and for each component, 3 subcomponents and 13 indicators for cybersecurity data, then a questionnaire based on the Likert scale of 5 options The expert opinion was adjusted and reviewed. By studying the methodology of similar research, modeling of structural equations by partial least squares (PLS) using SmartPLS software was selected to analyze the data. The fitting of the model, the fitting of the structural model and the general fitting of the model were calculated by fitting the analysis and fitting the model was evaluated. The results are presented in the form of final tables.
Keywords