Architectural dimensions of the computerized emergency response team of defense centers

Authors

1 Assistant professor and member of the academic staff of the university of malekashtar

2 phd.in S.N.D.U

3 Assistant professor and member of the academic staff of university the imam hosein; m_saleh@ihu.ac.ir

Abstract

The increasing use of information technology in defense organizations has caused valuable assets and information to be placed in this context; However, in the event of a computer incident and lack of preparation to respond, it will have irreparable consequences; Therefore, the necessity of forming a coherent team that can respond to computer emergencies in defense centers is felt; Before launching such an important matter, the macro-architecture must be done, which includes knowing the dimensions of the team; This research seeks to identify the dimensions of the macro architecture of the response team of the defense centers, and by relying on the library method, the required data was extracted, and with the opinion of experts in the field of cyber defense, questions were prepared and distributed among 65 experts of the target community. And then by analyzing the statistical results through spss software, the dimensions of the macro architecture of the emergency response team of defense centers were calculated as follows: 1. Management and command, 2. Security, 3.Mission, 4.Goals and functions. 5.Processes, 6.Structure and organization, 7.Technology, 8. Regulatory and legal were obtained.

Keywords


  •  فهرست منابع و مآخذ

    الف- منابع فارسی

    • درویش روحانی، بابک. (1390). مهندسی اطلاعات. تهران: دانشگاه پیام نور واحد هشتگرد.
    • رشتی، سید محمدرضا. (1388). راهنمای ایجاد یک گروه پاسخ­گویی به رخدادهای امنیتی رایانه‏ایCSIRT. تهران: رویش جوانه­های فردا.
    • -شمس، فریدون. (1383). «مفاهیم پایه معماری سازمانی»، مجله تکفا، سال دوم، شماره 3.
    • -شمس، فریدون و یادآور نیک­روش، سیدعلی. (1386). «بررسی تلفیق چارچوب FEAF و معماری سرویس­گرا»، دانشکده مهندسی برق و کامپیوتر. تهران: دانشگاه شهید بهشتی.
    • صیاد، محمدکاظم و امینی، آرمین و طاهری، ابوالقاسم. (1399) «تهدیدات سایبری و اقدامات امنیتی در فضای مجازی». فصلنامه علمی امنیت ملی، سال دهم، شماره سی و هشتم.
    • طیرانی، احسان. (1395). «مدیریت رخدادهای امنیت رایانه­ای و تشکیل تیم­های CERT سازمانی». آپای مشهد.
    • کشاورز، رضا. (1393). «ارایه الگوی استقرار CERT مراکز نظامی». مجله علمی پژوهش­های حفاظتی.
    • مهجوریان، امیررضا. (1386). «تدوین روش برنامه­ریزی معماری سازمانی سرویس­گرا در جهت پوشش کامل به چارچوب زکمن». پایان نامه کارشناسی ارشد مهندسی کامپیوتر گرایش نرم افزار، دانشگاه شهید بهشتی.

     

    ب- منابع لاتین

    • Beryl Bellman, Principal Instructor, )2018(.
    • Brownlee, N. (2018). "Expectations for Computer Security Incident Respons". U.S: Software Engineering Institute, Carnegie Mellon University.
    • Department of EC- COUNCIL. (2017). "Ethical Hacking and countermeasure v11.0".
    • Blueprint for a Secure Cyber Future: )2017(, The Cybersecurity Strategy forthe Homeland Security Enterprise NIST Incident Response , 2021, The step bysetp guide for incident response reporting.
    • Department of Defense. (2017). "DoD Architecture Framework Version 1.0". Available online at http://fas.org/irp/doddir/dod/chisr/index.htm.
    • Institute for Enterprise Architecture Developments (2017).
    • Killcrece, Georgia. Kossakowski, Klaus-Peter. Ruefle, Robin. Zajicek, Mark. . (2016) "State of the Practice of Computer Security Incident Response Teams (CSIRTs)". US: Carnegie Mellon University.
    • Penedo, David. (2018)."Technical Infrastructure of a CSIRT". Cote d'Azur: Internet Surveillance and Protection, ICISP '06. International Conference, : 27 – 27.
    • Pierre Jacobs, Sebastiaan von Solms and Marthie Grobler,)2019(, E-CMIRC: Towards a Model for the Integration of Services Between SOCs and CSIRTs)2017(.
    • Scarfone, Karen. Grance, Tim and Masone, Kell. ( March 2018). "Computer Security Incident Handling Guide". U.S: Department of Commerce, National Institute of Standards and Technology.
    • Stelvio bv. (2017). "CSIRT Services".U.S: Software Engineering Institute, Carnegie Mellon University.

    ·  Schekkerman, J. (2017)."How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework Paperback". New York: Trafford Publishing.

    • Sowell, P. (2017), "The C4ISR Architecture Framework: History, Status, and Plans". Version 2.0, developed by the U.S. Department of Defense (DoD).

    ·                Wilczynski, B. (2017). " Unified Profile for DODAF/MODAF (UPDM). http://www.updmgroup.org/index.htm

    Sowell, P. (2017), "The C4ISR Architecture Framework: History, Status, and Plans".  Version 2.0, developed by the U.S. Department of Defense (DoD)