0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Foresight Approach to Cyber Threats Identification and Scenario Planning
نویسندگان :
MAHDI OMRANI
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- Amirkabir University of Technology
2- Amirkabir University of Technology
3- Amirkabir University of Technology
کلمات کلیدی :
Cyber threats،foresight،key factor،cross-effects analysis،scenario
چکیده :
Cyberattacks impose a significant economic and operational burden on the critical infrastructure of countries. Recent advances in attacker tactics have increased the diversity of cyber threats. As a result, proactively anticipating emerging cyber threat scenarios is essential to strengthening organizational resilience. This research aims to systematically develop future scenarios of organizational cyber threats using futures studies methods. First, a comprehensive content analysis of the existing literature was conducted to identify the dimensions of cyber threats; the result of this process consists of six dimensions, including Actors, Methods, Targets, Consequences, Features, and Defense, and 27 components, which were validated by expert consensus. Then, a cross-effects analysis was conducted using MicMac software to measure the dependencies and level of influence of key factors. These factors were categorized into eight areas. Using qualitative input from an expert panel and the Scenario Wizard software, several plausible cyber threat scenarios were synthesized and developed. The analysis shows that organized threat actors, with primarily political and economic motivations, use methods such as ransomware and social engineering attacks to target servers and network equipment, and operate with the aim of disrupting application and protocol layer services. The findings highlight active defense as a key mechanism to counter cyber threats. This research provides a structured foresight framework to guide strategic cybersecurity planning and related policy development.
لیست مقالات
لیست مقالات بایگانی شده
AI-Powered Beauty Insights: Sentiment Analysis in a Low-Resource Language
Sajedeh Talebi - Neda Abdolvand - Fatemeh Mahdian
A Joint Trajectory and Energy Harvesting Method for an UAV Enabled Disaster Response Network
Hosein Mohammadi Firozjae - Javad Zeraatkar Moghaddam - Mehrdad Ardebilipour
Analysing effect of news polarity on stock market prediction: a machine learning approach
Golshid Ranjbaran - Dr Mohammad-Shahram Moin - Dr Sasan H Alizadeh - Dr Abbas Koochari
Robustness Gap in NLP Models for Vulnerability Descriptions: Benchmarking and Data Augmentation
AmirHossein Majd - Mahdi Yousefikia - Saghar Ghasemzadeh - Amirreza Asari - Arya Khoshnavataher - Seyedeh Leili Mirtaheri
Adaptive Semantic Communication for Non-Terrestrial Networks
Soroosh Miri - Sepehr Abolhasani - S. Mohammad Razavizadeh
یک روش کارآمد جهت تشخیص آنلاین حملات DRDoS به سرویس های مبتنی بر UDP درمعماری SDN با استفاده از الگوریتم های یادگیری ماشین
میترا اکبری کهنه شهری - دکتر رضا محمدی - دکتر محمد نصیری میترا اکبری کهنه شهری - رضا محمدی - محمد نصیری -
نظرکاوی در سطح مفهوم با استفاده از رویکردی ترکیبی
سیدرضا قادریان خیرآبادی سیدرضا قادریان خیرآبادی -
ISAAF: بهبود چارچوب مجوز خودتطبیق SAAF با استفاده از پیادهسازی مبتنی بر عامل و مفهوم I-Shairing
الهام معین الدینی - دکتر منیره عبدوس - دکتر اسلام ناظمی
Open-domain question classification and completion in conversational information search
Omid Mohammadi Kia - Mahmood Neshati - Mahsa Soudi Alamdari
خوشه بندی شبکههای بیسیم ادهاک مبتنی بر محدودیتهای فازی
پروا کلیبری - کریم صمدزمینی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2