Research article: Presenting a conceptual model of security analysis in the national cyberspace of countries

Authors

1 Doctor of Advanced Management Sciences - Faculty and Professor of the Higher National Defense University

2 PhD in Strategic Management of Cyberspace (Cyber Security) - Higher National Defense University (Corresponding Author)

Abstract

The national cyber or national cyber space is considered to be the rule of each country in cyber space, and in order to realize security in this space, the security situation of this space and all factors affecting it, observed, identify, evaluate and analyze continuous analysis. The occurrence of any disruptions to take action that this is a good idea to analyze the security of the national cyber space that the research-prescriber research is considered to be important and through the Internet search, library studies and the use of comments. Experts collected and analyzed theoretical basics, scientific models, national or international standards related to this issue. Due to the nature of the research documentation, a qualitative and related method was used and using wisdom, logic, gut and thought, documents and information were collected and content analysis, and by summarizing the findings, the structure of the desired model is adjusted Wentified. By examining more accuracy factors and integration of matched cases in order to overcap existing overlapping, dimensions, components and sub-components in the conceptual model of extraction and conceptual security model of security analysis in the national cyber space of countries were presented and presented. The results of the study showed that countries should be able to analyze their national cyber space security, infrastructure and security requirements such as security technologies, security processes, security resources, human resources capabilities, and organization (responsible and responsive institutions). Cognitive, service and infrastructure perspectives, and in this regard, such as policy making and planning, monitoring and continuous assessment, coordination and security cooperation.

Keywords


  • فهرست منابع و مآخذ

    الف. منابع فارسی

    • تقی­پور، رضا؛ خالقی، محمود و رامک، مهراب (۱۳۹۹)، 981109-نهایی-الگوی معماری و تحلیل امنیت شبکه ملی سایبری جمهوری اسلامی ایران.docx. دانشگاه عالی دفاع ملی: دانشگاه عالی دفاع ملی.
    • ‏‫حافظ­نیا، محمدرضا (۱۳۹۴)، جغرافیای سیاسی فضای مجازی. سمت.

     

    ب. منابع لاتین

    • Bartholomees, J. Boone (ed.). (2012). U.S. Army War College guide to national security issues Volume 2 (5th ed, Vol. 2). Carlisle, PA: Strategic Studies Institute, U.S. Army War College.
    • Commonwealth of australia. (2009). Cyber Security Strategy. australian government.
    • Fahrurozi, Muhammad; Tarigan, Soli Agrina; Tanjung, Marah Alam; & Mutijarsa, Kusprasapta. (2020). The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence). In 2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 86–91). IEEE.
    • Falessi, N; Gavrila, R; Klejnstrup, MR; & Moulinos, K. (2012). National cyber security strategies: practical guide on development and execution. European Network and Information Security Agency (ENISA) Publication.
    • Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior.
    • Goverment of Canada. (2010). Canada’s cyber security strategy: for a stronger and more prosperous Canada. Canada: Goverment of Canada.
    • Great Britain; & Cabinet Office. (2009). Cyber security strategy of the United Kingdom: safety, security and resilience in cyber space. London: Stationery Office.
    • Great Britain; & Home Office. (2010). Cyber crime strategy. London: Stationery Office.
    • Group, NIST Cloud Computing Security Working; & others. (2013). NIST cloud computing security reference architecture. National Institute of Standards and Technology.
    • INTERNATIONAL TELECOMMUNICATION UNION. (2004). ITU-T Recommendation X.805: Security architecture for systems providing end-to-end communications. INTERNATIONAL TELECOMMUNICATION UNION.
    • ITU, Frederick Wamala. (2011). ITU NATIONAL CYBERSECURITY STRATEGY GUIDE.
    • Klimburg, Alexander; & NATO. (2012). National cyber security framework manual.
    • New Zealand Government. (2011). NEW ZEALAND’S CYBER SECURITY STRATEGY. New Zealand Government.
    • Rauscher, Karl Frederick; & Yaschenko, Valery. (2011). Russia–US Bilateral on Cyber Security: Critical Terminology Foundations. New York, USA: EastWest Institute.
    • Ross, Ron; Oren, Janet; & McEvilley, Michael. (2014). Systems security engineering: An integrated approach to building trustworthy resilient systems. National Institute of Standards and Technology.
    • Ross, Ron; & others. (2010). NIST SP 800-37, Revision 1. Guide for Applying the Risk Management Framework to Federal Information Systems.
    • Schmitt, Michael N. (ed.). (2013). Tallinn manual on the international law applicable to cyber warfare: prepared by the international group of experts at the invitation of the NATO Cooperative Cyber Defence Centre of Excellence. Cambridge ; New York: Cambridge University Press.