Presenting the proposed CERT model of defense organizations in order to reduce cyber threats
Reza
Keshavarz
author
Mohammad Reza
Movahedi Sefat
Assistant Professor and Faculty Member of the Higher National Defense University.
author
text
article
2021
per
One of the most important things to keep in mind when security incidents occur is for a military organization to know how to respond appropriately to that incident. In fact, speed in detecting, analyzing, and responding to a security problem reduces the risk and cost of repair. CERT, the Computer Emergency Response Team, is responsible for supporting and servicing to prevent, respond to, and eliminate computer incidents such as malicious services, malware release, unauthorized access, improper use, and combined attacks. In order to respond to incidents that occur in the shortest possible time, it is necessary to set up a reliable CERT in military centers; In such a way that in a reliable environment, the network can be controlled and attacks and unauthorized intrusions can be detected, and in the shortest possible time, with the optimal communication between the components, the response speed can be increased; Therefore, the existence of CERT in these organizations is a strategic issue. In this research, with the studies conducted and using the opinion of military experts in the field of cyber and statistical results analysis, the proposed CERT model of hybrid military (hybrid), services and services to be provided, position and level of authority and CERT organizational chart Military centers are provided.
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
5
26
https://www.qjws.ir/article_249539_eaf7f678b1d33d3f0578215eb8bb29e2.pdf
Explain the role of cyberspace in the expansion of ISIL's geopolitical territory in the region
Mohammad Hossein
Zamani Farahani
author
text
article
2021
per
As a splinter group of al-Qaeda, ISIL claimed the caliphate and ruled over large parts of the Islamic Republic of Iraq and Syria with the start of the Syrian civil crisis in 2014. The group is increasing its land acquisition, taking advantage of the crisis in Syria and Iraq; In 2015, half of Syria was occupied by the group. On the other hand, ISIL's advance in Iraq, the group was able to occupy a large depth of Iraqi territory and, as it continued to occupy, gained control of large parts of northern and eastern Iraq to the entrances to Baghdad. With the rapid rise of cyberspace capabilities in recent years and its widespread use among communities around the world, terrorist groups have not been unaware of the use of cyberspace capabilities. According to the evidence, the strategy of expanding the sphere of psychological influence by creating an atmosphere of terror by publishing images of the brutal killing of ISIL in the wars in Iraq and Syria has been successful. Therefore, considering the importance of this issue in identifying the behavior of terrorist groups in the age of information technology, the present study tries to describe and discover the impact of ISIL's use of cyberspace by descriptive-analytical method and using library resources. Social networks control and expand the cultural and territorial sphere of influence of this group in the region.
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
27
44
https://www.qjws.ir/article_249546_753c849bf8c71a0cb93e0a28055757bb.pdf
Dimensions of the resistance economy in the army of the Islamic Republic of Iran with the approach of emerging threats
Ahmad
Pourdastan
author
Naser
Abbaszadeh
Associate Professor and Faculty Member of Imam Ali University
author
Mohsen
Sadeghinassab
Assistant Professor and Faculty Member of the Army Command and Staff University
author
text
article
2021
per
Today, the army of the Islamic Republic of Iran in the field of resistance economics is facing problems or concepts that have not been similar to us in terms of opinion, textbooks, practice and human experiences. In a resistance economy, it should be noted that in the field of defense has always been an important part of human life; Because human defense measures repel or reduce the effect of aggression. But how to defend depends on different factors and conditions, and human beings in their lifetime have tried to use their intellect, tact and will to choose the best way of defense in different situations, against the invasion of their enemies and choose it. Close the work. Therefore, the purpose of this study is to identify the dimensions of resistance economics and overcome emerging threats. . Characteristics of this designated number (service age over 25 years, at least during the Davos period, Brigadier General's service position familiar with strategy and strategic issues and command history). The type of research is applied and the case-contextual method is used with a mixed approach. Finally, according to the research findings and the use of Friedman ranking test, dimensions of resistance economics such as; Knowledge-based economy, jihadi management, knowledge-based, economic independence, strengthening work culture, reforming consumption patterns, the spirit of hope for the future and the spirit of self-confidence of employees were identified.
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
45
67
https://www.qjws.ir/article_249548_d75b8ab0427aec203b4a25c6e2acc122.pdf
Social Media War Analysis
Concepts, dimensions and offensive and defensive tactics
Mohammad Reza
Karimi Ghahroudi
Faculty member of Malek Ashtar University of Technology
author
Neda
Anami
Cyber researcher
author
text
article
2021
per
In the 21st century, we are deeply entrenched in the age of irregular warfare and unconventional warfare, in which the scene of war is much less definite than before, and the strategy of confrontation must be dynamic, fluid, and adaptable. Cyber warfare and social media warfare are some of the most emerging concepts of this era. What makes social media a good tool for warfare is the possibility of public access to it and its ease of use compared to previous tools and the lack of need for high technical skills and expertise. This feature has shifted the focus of power from large institutions such as governments and large media outlets to individuals and networks of individuals, and has had a dramatic impact on warfare with the ability to create and disseminate comprehensive information. Another distinctive feature is that the cognitive realm targets the attitudes and beliefs of individuals and society. Today, social media warfare has become a topic of study in the military sciences and will certainly play a greater role in future battles. All types of military and civilian organizations need to monitor how their enemies use social media, defend themselves against ongoing social media attacks, and use social media as a weapon to achieve their goals. In this article, while presenting an analytical framework and categorizing the ten functional areas of social media warfare, we will introduce the concepts, dimensions, threats and offensive and defensive tactics of dealing with it in various military, economic, social, political, etc. areas. .
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
69
92
https://www.qjws.ir/article_249549_6ef5acf7fba97ef60efa470b47f66826.pdf
Security factors influencing the outbreak of combined warfare by militant groups in West Asia
Ali
Rostami
Teacher Dafoos
author
Mohammad Taghi
Partovi
PhD in Operations Research, University of Tehran - Davos Faculty Member
author
hossein
Zarrin Kolah
PhD student at the Higher National Defense University
author
text
article
2021
per
Investigate the causes of the war one of the most important issues in the study of war, causes and effective security in the war between nations on a broad variety of disagreements and political conflicts, dedication and utmost selfishness, competition, economic and border conflicts, etc. Search Made The West Asia region has been the focus of the Tarring groups in the form of Combined Warfare in recent years. The present paper aims to investigate the effective security factors affecting the combination of warfare by tartar groups in West Asia based on constructivism theory. In order to achieve this goal, the researcher followed the question of how the effective security factors in West Asia were combined into a combined war. In this paper, using the expert opinions of the professors Dafos AJA, the students of the faculty of security at Dae'a tried to find the answers to the questions using the descriptive-analytical research method.
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
93
117
https://www.qjws.ir/article_249556_7dbb9ed650fabcb0edb470b2cfa2da4d.pdf
Scenario of protection of defense systems and confrontation against weapons and equipment of US electronic warfare on the horizon 1410
Mohammad Javad
Ghalandari
PhD student of Imam Hossein University,
author
Ali Reza
Sadeghi
Assistant Professor of Imam Hussein University (AS)
author
Falah
Mohammad Zadeh
PhD student of Imam Hossein University (AS)
author
Mehdi
Jafari Mighaddam
PhD student of Imam Hossein University (AS)
author
text
article
2021
per
This article discusses how to protect defense systems and counter US weapons and electronic warfare equipment on Horizon 1410 by the region's Islamic Resistance Group with the United States and its allies. The purpose of this study is to develop scenarios for the protection of defense systems and how to deal with them, along with determining how to invest in the defense industry and how to do it for optimal defense against US electronic warfare equipment with emphasis on the most effective methods of defense and confrontation. . In this study, first, the perspective of US e-warfare in military capabilities was extracted from a document published by the US Department of Defense and the monitoring of existing trends by e-warfare experts using experts using 154 trends in 9 major trends. Then, by Delphi method, important trends with high probability of occurrence were counted. Finally, 18 scenarios were obtained with Scenario Wizard software and different defense methods for each of these descriptors, the most effective methods were selected in the form of compatible scenarios. The research proposal is a priority for investing in these defense methods. In other words, with this research, د the defensive measures that affect the most threats have been obtained. The purpose of this study is to develop electronic defense protection scenarios with emphasis on the most prioritized and effective defense methods in order to achieve maximum efficiency in the field of technology.
War Studies
University of Command and Staff of the Army of the Islamic Republic of Iran
2717-1760
3
v.
9
no.
2021
119
134
https://www.qjws.ir/article_249607_7d78c4201e7f8f4f26c324edb79b0095.pdf