0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Foresight Approach to Cyber Threats Identification and Scenario Planning
نویسندگان :
MAHDI OMRANI
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- Amirkabir University of Technology
2- Amirkabir University of Technology
3- Amirkabir University of Technology
کلمات کلیدی :
Cyber threats،foresight،key factor،cross-effects analysis،scenario
چکیده :
Cyberattacks impose a significant economic and operational burden on the critical infrastructure of countries. Recent advances in attacker tactics have increased the diversity of cyber threats. As a result, proactively anticipating emerging cyber threat scenarios is essential to strengthening organizational resilience. This research aims to systematically develop future scenarios of organizational cyber threats using futures studies methods. First, a comprehensive content analysis of the existing literature was conducted to identify the dimensions of cyber threats; the result of this process consists of six dimensions, including Actors, Methods, Targets, Consequences, Features, and Defense, and 27 components, which were validated by expert consensus. Then, a cross-effects analysis was conducted using MicMac software to measure the dependencies and level of influence of key factors. These factors were categorized into eight areas. Using qualitative input from an expert panel and the Scenario Wizard software, several plausible cyber threat scenarios were synthesized and developed. The analysis shows that organized threat actors, with primarily political and economic motivations, use methods such as ransomware and social engineering attacks to target servers and network equipment, and operate with the aim of disrupting application and protocol layer services. The findings highlight active defense as a key mechanism to counter cyber threats. This research provides a structured foresight framework to guide strategic cybersecurity planning and related policy development.
لیست مقالات
لیست مقالات بایگانی شده
Combinatorial Auction Based on Social Choice in the Internet of Things
Maede Esmaeili - Faria Nassiri-Mofakham - Fatemeh Hassanvand
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
Load Balancing in Software-Defined Networks Using Multi-Level Thresholds and Hybrid Switch Migration Strategies
Alireza Karimi - Mohammad yousef Darmani
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
ارائۀ چارچوب هستانشناسی برای شهر هوشمند مبتنی بر سیستمهای سایبر-فیزیکی
علی اصغر قائمی - جعفر حبیبی - سید حسن میریان
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
A Comparison between Slimed Network and Pruned Network for Head Pose Estimation
Amir Salimiparsa - Hadi Veisi - Mohammad-shahram Moin
SDN-based Deep Anomaly Detection For Securing Cloud Gaming Servers
Mohammadreza Ghafari - Dr Seyed Mostafa Safavi Hemami
ارائه مدل یادگیری ماشین برای پیشبینی سریزمانی باینری از دیدگاه مسئلههای دستهبندی با کاربرد در پیشبینی نتهای موسیقی
نیلوفر ع��دلخانی - حسام عمرانپور
PeCoQ: A Dataset for Persian Complex Question Answering over Knowledge Graph
Romina Etezadi - Mehrnoush Shamsfard
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2