Critical Information Infrastructure Cyber-Protection Strategic in Islamic Republic of Iran

Document Type : Original Article

Authors

1 Associate Professor of Higher National Defense University

2 Assistant Professor Imam Hussein University

3 Associate Professor of Imam Hossein University (AS)

4 PhD student in Strategic Management of Cyber ​​Security, National Defense University, Corresponding Author

Abstract

Background and Aim: The greatest task of law enforcement is to safeguard values. Based on the vision of 1404 NAJA, private and public institutions and agencies should seek to identify the most effective factors in reducing ethical security when establishing, identifying and maximizing family effectiveness, ensuring public safety and managing the community. The basic policing in this area is aimed at identifying and providing appropriate solutions to them.
Method: From the practical point of view, the data collection is a combination of qualitative and thematic analysis of the thematic analysis. The statistical population consists of 70 commanders, managers and experts in ethical security field. In the quantitative part of the sample size, 70 individuals were selected in total. Data collection was done by a semi-structured and researcher-made questionnaire whose validity was provided by experts and reliability of the closed questionnaire by Cronbach's alpha coefficient (0.89). Content analysis and rank test were performed by Friedman.
findings: Seven components of the discovery component were found to be in the first rank in the "inadequacy in education" component with a mean of 38/90 and "management conflict" with a mean of 38/84 in the first component; Below are four components of the discovery (legal) background that have a mean of "cultural problems" with a mean of 38.83 and a "legal vacuum" with a mean of 38.58.
Results: The results showed that Friedman's mean rank was not the same for the items, even though the difference between the means was not very high. On the other hand, most of the respondents are in the first place on the Tasum scale for structural challenges with a mean of 38.51%, behavior with a mean of 38.27 (legal) with a mean of 38.20.

  1. فهرست منابع ومآخذ

    الف) منابع فارسی

    1. امام خامنه‌ای (مدظله‌العالی)، مجموعه بیانات قابل‌دسترسی در پایگاه www.khamenei.ir
    2. آندرس، جیسن (1396)، جنگ سایبری؛ تکنیک‌ها، تاکتیک‌ها و ابزارها برای فعالان حوزه امنیت، ترجمه حوزه نوآوری آرایه‌های دفاعی، تهران، مؤسسه آموزشی و تحقیقاتی صنایع دفاعی.
    3. عبداللهخانی، علی (1385)، حفاظت از زیرساخت‌های حیاتی اطلاعاتی، فصلنامه سیاست دفاعی، شماره 54.
    4. کافی، سعید (1393)، تدوین راهبردهای پدافند غیرعامل در فضای سایبری زیرساخت‌های حیاتی ج.ا.ایران، تهران، دانشگاه عالی دفاع ملی، دانشکده امنیت.
    5. مصطفایی، محمد (1394)، زیرساخت‌ها و ضرورت حفاظت از آن‌ها، راهبرد پایدار، سال اول، شماره 1، صص 32 -35.
    6. موحدی صفت، محمدرضا؛ ولوی، محمدرضا (1395)، ارائه الگوی امن استقرار زیرساخت‌های دفاعی کشور در محیط رایانش ابری، مجله دانش راهبردی، سال 6، شماره 23، صص 189-206.

     

    ب-1) منابع لاتین

    1. David Rehak and Martin Hromada (2016), “Failures in a Critical Infrastructure System”, repot intechopen, pp 76-97. (http://dx.doi.org/10.5772/intechopen.70446)
    2. ENISA, (2016), “Strategies for Incident Response and Cyber Crisis Cooperation”, PUBLISHED Version 1.1.
    3. Euisun Paik, Heung Youl Youm, (2012), “ Knowledge Sharing Series Cybersecurity”, APCICT Publication, PP 1-108.
    4. Kevin Mitnick, (2016), “Top 10 risk and compliance management related news stories and world events that (for better or for worse) shaped the week's agenda, and what is next”, International Association of Risk and Compliance Professionals (IARCP), pp 1-168.

     

    ب-2) مقالات

    1. A.Poustourli and D. Ward and A.Zachariadis, (2015), “An Overview of European Union and United States Critical Infrastructure Protection Policies”. Proceedings of the 12th International Conference “Standardization, Protypes and Quality: A means of Balkan Countries’ Collaboration”, pp 549-557.
    2. Chen K. Hu C. Zhang X. Zheng K. Chen Y. and Vasilakos A. (2011), “Survey on routing in data centers: insights and future directions,” IEEE Network, vol. 25, no. 4, pp. 6 –10.
    3. David Satola, W.J. Luddy, (2017),” The Potential for an International Legal Approach to Critical Information Infrastructure Protection”, 47 JURIMETRICS, PP 315-334.
    4. Drias, Z. Serhrouchni, A. Vogel, O. (2015) “Analysis of Cyber Security for Industrial Control Systems,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol. no. pp. 1–8.
    5. FFIEC, (2015), FFIEC Cybersecurity Assessment Tool. Appendix C: Glossary, pp 1-38.
    6. ENISA, (2018), " ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends, ENISA Report ETL 2018.
    7. ENISA, (2015), “Critical Information Infrastructures Protection approaches in EU”, Final Document, TLP Green, Version 1.
    8. ENISA, (2014), “ Methodologies for the identification of Critical Information Infrastructure assets and services Guidelines for charting electronic data communication networks ”, PP 1-39.
    9. Esmaeili, mohammadreza, (2014) " A STUDY ON THE EFFECT OF THE STRATEGIC INTELLIGENCE ON DECISION MAKING AND STRATEGIC PLANNING",International Journal of Asian Social Science.
    10. Eric Luiijf, (2016), “The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for governmental policy-makers”, Meridian Connecting and Protecting, pp 1-62.
    11. Joseph O. Eichenhofer and Elisa Heymann and Barton P. Miller, (2017), “ In-Depth Software Vulnerability Assessment of Container Terminal Systems”, 2nd NATO Conference on Cyber Security in the Maritime Domain, Souda, Crete, Greece, pp 1-17.
    12. Kadri Kaska and Lorena Trinberg, (2015),Regulating Cross-Border Dependencies of Critical Information Infrastructure,Nato Cooperation Cyber Defence Center of Excellence report, Tallinn Eslonia, 2015.
    13. KS Min, (2015), “An International Comparative Study on Cyber Security Strategy”, International Journal of Security and Its Applications Vol.9, No.2 (2015), pp 13-20.
    14. L. Cazorla, C. Alcaraz, and J. Lopez, (2016), “Cyber Stealth Attacks in Critical Information Infrastructures", IEEE Systems Journal, pp. 1-15.
    15. Luiijf E, van Schie T, van Ruijven T, Huistra, A, (2016), good practice guide on critical information infrastructure protection for governmental policy-makers, The GFCE-MERIDIAN.
    16. Martin Koyabe, (2015), “Critical Information Infrastructure Protection A Commonwealth Perspective”, ITU Workshop on “ICT Security Standardization for Developing Countries, pp 1-45.
    17. OECD, (2018), “Recommendation of the Council on the Protection of Critical Information Infrastructures”, OECD/LEGAL/0361
    18. Segura Serrano A. "Cybersecurity: towards a global standard in the protection of critical information infrastructures", in European Journal of Law and Technology, Vol 6, No 3.
    19. Ugur Akyazi, (2014), “Possible Scenarios and Maneuvers for Cyber Operational Area”, 13th European Conference on Cyber Warfare and Security - Cryptome, PP 15-21.
    20. Xing Gao, Zhang Xu, Haining Wang, Li Li, and Xiaorui Wang, (2018), "Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center", in NDSS 2018, San Diego, CA.