0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Foresight Approach to Cyber Threats Identification and Scenario Planning
نویسندگان :
MAHDI OMRANI
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- Amirkabir University of Technology
2- Amirkabir University of Technology
3- Amirkabir University of Technology
کلمات کلیدی :
Cyber threats،foresight،key factor،cross-effects analysis،scenario
چکیده :
Cyberattacks impose a significant economic and operational burden on the critical infrastructure of countries. Recent advances in attacker tactics have increased the diversity of cyber threats. As a result, proactively anticipating emerging cyber threat scenarios is essential to strengthening organizational resilience. This research aims to systematically develop future scenarios of organizational cyber threats using futures studies methods. First, a comprehensive content analysis of the existing literature was conducted to identify the dimensions of cyber threats; the result of this process consists of six dimensions, including Actors, Methods, Targets, Consequences, Features, and Defense, and 27 components, which were validated by expert consensus. Then, a cross-effects analysis was conducted using MicMac software to measure the dependencies and level of influence of key factors. These factors were categorized into eight areas. Using qualitative input from an expert panel and the Scenario Wizard software, several plausible cyber threat scenarios were synthesized and developed. The analysis shows that organized threat actors, with primarily political and economic motivations, use methods such as ransomware and social engineering attacks to target servers and network equipment, and operate with the aim of disrupting application and protocol layer services. The findings highlight active defense as a key mechanism to counter cyber threats. This research provides a structured foresight framework to guide strategic cybersecurity planning and related policy development.
لیست مقالات
لیست مقالات بایگانی شده
A Real-Time and Robust Approach for Banknote Recognition
Hani Abdi - Mohammad Javad Parseh
خوشه بندی شبکههای بیسیم ادهاک مبتنی بر محدودیتهای فازی
پروا کلیبری - کریم صمدزمینی
فراتر از ارزیابی: استفاده استراتژیک از نظریه بازی برای بازتعریف سازوکارهای همتاسنجی
سیده فاطمه نورانی - سحر مقراضی
Generalized Self-Attentive Spatiotemporal GCN with OPTICS Clustering for Recommendation Systems
Saba Zolfaghari - Seyed Mohammad Hossein Hasheminejad
Experimental analysis of automated negotiation agents in modeling Gaussian bidders
Fatemeh Hassanvand - Dr Faria Nassiri-Mofakham
هوشمندسازی در صنعت تایر با استفاده از هوش تجاری برای تحلیل و پایش شرایط عملیاتی و شرایط محصول
پوریا عزتی
رویکردی در تشخیص خودکار بوهای بد در مدل های معماری سازمانی با استفاده از تحلیل گرافی
زهرا رحیمی تمندگانی - شهره آجودانیان
بهبود کارایی بارسپاری در شبکه های سلولی با استفاده از ارتباطات مشارکتی در لایه MAC
نبیل الراشدی - رسول صادقی - وائل حسین اللامی - مهدی حمیدخانی
Secure Mutual Authentication and Key Agreement Protocol for IoT
Mostafa Sadeghi
Integration of Electric Vehicles in Smart Grid using Deep Reinforcement Learning
Farkhondeh Kiaee
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2