Provide a native model of cyber monitoring,monitoring and alerting based on the ooda cycle

Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:

The use of cyberspace has created new challenges in the national security domain, in a way that has essentially transformed the concepts of security in all aspects of national power. These security issues have sometimes affected cyber-security systems and infrastructures, which have had a direct impact on the national security of countries in the form of cyber threats and threats, by undermining the dimensions of cyber security. Given the importance of preventing these injuries, it is necessary to take precautionary measures with respect to the hazards in question. To this end, due to the serious vacuum in deploying systems that can perform cyber-space identification and alerting activities at the right time, a model for cyber-monitoring, monitoring and alerting has been attempted based on a comparative study of structures in selected countries. Submitted in accordance with indigenous policies and regulations. According to the subject and purpose of the research, the type of research is applied development. The research methodology of the combined method includes library studies for collecting successful experiences of other countries and comparing them and then open interviews through a panel of experts in the qualitative section and then distributing the questionnaire to evaluate the components of the model presented. The statistical population of the present study was 20 experts in the field of information technology and communications and security sector of the country. In this paper, based on the compilation of the comparative study results of selected countries, a cyber-monitoring, monitoring and warning model based on the OODA(Observation, Orientation, Decision, Action) cycle has been presented and the components of the model are prioritized according to the experts' opinion, which according to their opinion, the priority of the four stages It includes observation, Orientation, action and decision making, and the most important components of cyber dimensions are cultural, defense-security, diplomacy, social, economic, science, technology, and politics, respectively.

Language:
Persian
Published:
National Security, Volume:10 Issue: 37, 2020
Pages:
499 to 537
https://www.magiran.com/p2203071  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با ثبت ایمیلتان و پرداخت حق اشتراک سالانه به مبلغ 1,390,000ريال، بلافاصله متن این مقاله را دریافت کنید.اعتبار دانلود 70 مقاله نیز در حساب کاربری شما لحاظ خواهد شد.

پرداخت حق اشتراک به معنای پذیرش "شرایط خدمات" پایگاه مگیران از سوی شماست.

اگر مقاله ای از شما در مگیران نمایه شده، برای استفاده از اعتبار اهدایی سامانه نویسندگان با ایمیل منتشرشده ثبت نام کنید. ثبت نام

اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!