The Cyberspace Defense-Security Factors of the Sensitive and Critical Infrastructure of the Islamic Republic of Iran Based on the Passive Defense Approaches

Document Type : Original Article

Author

Assistant Professor of Aerospace Education, Imam Hossein University

Abstract

The social life in every country is based on the sustained performance of their critical and sensitive infrastructures. It is for this very reason that hostile countries try to prevent this function from working in the target countries. Today, the development of information technology in cyberspace has caused some important parts of the way critical and sensitive infrastructures of the country function to come to rely on such space. Due to such dependence, the security of the infrastructures has been tied to the cyberspace. As far as the present research is concerned, it seeks to address the security defense indicators of the cyberspace of the critical and sensitive infrastructure across the country by considering the passive defense approaches, for in case the topic of this research is not attended to, the critical and sensitive infrastructure of the country will be highly likely exposed to cyber attacks. It should not be forgotten that according to ‘Clausewitz’, “Every age has its own kind of war, its own limiting conditions”. By the same token, in the age of information, our country is in need of establishing the security-defense indicators of its own cyberspace that is replete with threats against which the resilience of the infrastructures can be enhanced by studying the present research. As such, these indicators have been constructed in three areas: human power, processes and technology using analytical-descriptive method via survey method and making maximum use of elites’ views. A statistical sample of 50 individuals has been selected for this research. The method of sampling was purposeful non-random sampling where the researcher has had direct reference to particular persons in a purposeful manner. The finding of the research indicates that each passive defense approach in the above-mentioned areas in relation with the security- defense indicators of the cyberspace of IRI’s critical and sensitive infrastructures includes the following: human resources: “instructing, informing and using local forces” with average agreement of 88%; processes: “constructing the defense-security policy protocol, limiting the scope of performance, and mutual dependence” with average agreement of 45%; and technology: “using intranet, localizing software and hardware, operating malware identification laboratories, encrypting data and using Firewall, and Honeypot and Intrusion Detection and Prevention System”, with average agreement of 98%.

Keywords


سازمان پدافند غیرعامل کشور (1393)، اصول حاکم بر پدافند سایبری کشور، تهران: انتشارات مؤسسه سایبربان.
شورای عالی فضای مجازی (1398)، حکمرانی فضای مجازی، قابل دسترسی در:          www.majazi.ir
کانون اندیشه راهبردی سازمان پدافند غیرعامل (1395)، مصون‌سازی و پایداری کشور در برابر تهدیدها با پدافند غیرعامل، تهران: انتشارات روزنامه همشهری.
Baheti, R. (2015), Cyber-physical systems: Netherland, Elsevier Publication.
Bashan, A. (2013), The extreme vulnerability of interdependent spatially: London, Taylor & Francis‌ Publication.
Boyes, H. (2016), Trustworthy cyber-physical systems: Netherland, Wolters Kluwer Publication.
Chess, A. (2017), Hybrid and Embedded Software Systems: London, Pearson Publication.
Coleman, E.(2015), The City as a Platform - Stripping out complexity and Making Things Happen: London,  Thomson Reuters. 
Cotton,  Oliver (2015) Cyberspace: The New World Game: London, Phaidon Publication.
Davis, P. (2016), How to Rebuild the City as a Platform: Netherland, Elsevier.
Doytsher, Jack, (2016) Rapid urbanization and mega cities: the need for spatial information management: London, Press Publication.
Gabriel, P. (2017), Global Health Observatory (GHO): London, Pearson Publication.
Knigh, Shawn, (2012), Duqu Trojan contains mystery programming language in Payload
Poovendran, R. (2014), Cyber-physical systems: close encounters between two parallel worlds: Washington, Pearson Publication.
Rinaldi, S. (2017), Identifying, understanding, and analyzing critical infrastructure interdependencies: London, Pearson Publication.
Shafi, Q. (2017), Cyber physical systems security: a brief survey: Netherland, Elsevier.