0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Foresight Approach to Cyber Threats Identification and Scenario Planning
Authors :
MAHDI OMRANI
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- Amirkabir University of Technology
2- Amirkabir University of Technology
3- Amirkabir University of Technology
Keywords :
Cyber threats،foresight،key factor،cross-effects analysis،scenario
Abstract :
Cyberattacks impose a significant economic and operational burden on the critical infrastructure of countries. Recent advances in attacker tactics have increased the diversity of cyber threats. As a result, proactively anticipating emerging cyber threat scenarios is essential to strengthening organizational resilience. This research aims to systematically develop future scenarios of organizational cyber threats using futures studies methods. First, a comprehensive content analysis of the existing literature was conducted to identify the dimensions of cyber threats; the result of this process consists of six dimensions, including Actors, Methods, Targets, Consequences, Features, and Defense, and 27 components, which were validated by expert consensus. Then, a cross-effects analysis was conducted using MicMac software to measure the dependencies and level of influence of key factors. These factors were categorized into eight areas. Using qualitative input from an expert panel and the Scenario Wizard software, several plausible cyber threat scenarios were synthesized and developed. The analysis shows that organized threat actors, with primarily political and economic motivations, use methods such as ransomware and social engineering attacks to target servers and network equipment, and operate with the aim of disrupting application and protocol layer services. The findings highlight active defense as a key mechanism to counter cyber threats. This research provides a structured foresight framework to guide strategic cybersecurity planning and related policy development.
Papers List
List of archived papers
SDN-based Deep Anomaly Detection For Securing Cloud Gaming Servers
Mohammadreza Ghafari - Dr Seyed Mostafa Safavi Hemami
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
Predicting Concentration of Particulate Matter (PM2.5) in Hamedan using Machine Learning Algorithms
Anita Karim Ghassabpour - Hatam Abdoli - Muharram Mansoorizadeh - Saeid Seyedi
رویکرد تطبیقی-ترکیبی در پیادهسازی مشارکت الکترونیکی پایدار: درسآموختههای بینالمللی و مدل پیشنهادی ایران
عاطفه فرازمند - فاطمه پاک مهر
An efficient hybrid approach for performance-based alternative design evaluation in systems engineering
Abbas Chaman Para - Maryam Nooraei Abadeh - Sondos Bahadori
A clonal selection mechanism for load balancing in the cloud computing system
Melika Mosayyebi - Reza Azmi
تشخیص و جلوگیری از حمله انعکاسی/تقویتی SSDP در شبکه های نرم افزار محور مبتنی بر 4P با استفاده از الگوریتم های یادگیری ماشین
امیرحسین کرمی - رضا محمدی
شناسایی و تحلیل ظرفیتهای استفاده از فناوری هوش مصنوعی در توسعه و بهبود شاخص مشارکت الکترونیکی
فرشاد حکمی زاده - عاطفه فرازمند
A Data-Efficient Approach to Solar Panel Micro-Crack Detection via Self-Supervised Learning
Alireza Akhavan safaei - Pegah Saboori - Reza Ramezani - Morteza Tavana
From Faces to Words: An Efficient Persian Visual Lip Reading
Mana Amini - Sajjad Aemmi - Azadeh Ashouri - Reza Akhoundzadeh - Kourosh Hassanzadeh - Mohammad Reza Mohammadi
more
Samin Hamayesh - Version 42.5.2