0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Foresight Approach to Cyber Threats Identification and Scenario Planning
Authors :
MAHDI OMRANI
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- Amirkabir University of Technology
2- Amirkabir University of Technology
3- Amirkabir University of Technology
Keywords :
Cyber threats،foresight،key factor،cross-effects analysis،scenario
Abstract :
Cyberattacks impose a significant economic and operational burden on the critical infrastructure of countries. Recent advances in attacker tactics have increased the diversity of cyber threats. As a result, proactively anticipating emerging cyber threat scenarios is essential to strengthening organizational resilience. This research aims to systematically develop future scenarios of organizational cyber threats using futures studies methods. First, a comprehensive content analysis of the existing literature was conducted to identify the dimensions of cyber threats; the result of this process consists of six dimensions, including Actors, Methods, Targets, Consequences, Features, and Defense, and 27 components, which were validated by expert consensus. Then, a cross-effects analysis was conducted using MicMac software to measure the dependencies and level of influence of key factors. These factors were categorized into eight areas. Using qualitative input from an expert panel and the Scenario Wizard software, several plausible cyber threat scenarios were synthesized and developed. The analysis shows that organized threat actors, with primarily political and economic motivations, use methods such as ransomware and social engineering attacks to target servers and network equipment, and operate with the aim of disrupting application and protocol layer services. The findings highlight active defense as a key mechanism to counter cyber threats. This research provides a structured foresight framework to guide strategic cybersecurity planning and related policy development.
Papers List
List of archived papers
ISAAF: بهبود چارچوب مجوز خودتطبیق SAAF با استفاده از پیادهسازی مبتنی بر عامل و مفهوم I-Shairing
الهام معین الدینی - دکتر منیره عبدوس - دکتر اسلام ناظمی
Detection of Backdoor Attacks in Neural Networks Using Input Optimization
Parsa Hashemi Khorsand - Ahmad Nickabadi
چارچوب بومی پیادهسازی حکمرانی داده در رسانههای عمومی بر پایه مدل EDM
مریم فتحی - عبدالله امیرخانی - فرشید بهجت محمدی - ملیحه حاجی حسینی
Two Novel Designs of Efficient Single-Bit Comparators in QCA Technology with Ultra-Low Energy Dissipation
Shobeir Fayazi - Hatam Abdoli
Vi-Net: A Deep Violent Flow Network for Violence Detection in Video Sequences
Tahereh Zarrat Ehsan - Seyed Mehdi Mohtavipour
تشخیص خودکار اختلال عروقی ماکولا با عنوان عروق گسترش یافته در تصاویر آنژیوگرافی حاصل از تصویربرداری OCTA
راضیه گنجی - دکتر محسن ابراهیمی مقدم - دکتر رامین نوری نیا
AI-Driven Approach to Detect Equivalent Elements within Domain Models
Mohammad-Sajad Kasaei - Mohammadreza Sharbaf - Afsaneh Fatemi - Bahman Zamani
Agentic Username Suggestion and Multimodal Gender Detection in Online Platforms: Introducing the PNGT-26K Dataset
Farbod Bijary - Mohsen Ebadpour - Amirhosein Tajbakhsh
مروری بر الگوریتمهای انتخاب مشتری در یادگیری فدرال
عطیه منعمی بیدگلی - رضا مهدوی
Knowledge Distillation through a Knowledge Representation Approach (Knowledge Engineering)
Mohammad Hadi Safari Nader
more
Samin Hamayesh - Version 42.5.2