Cyber Threats Foresight Against Iran Based on Attack Vector

Authors

  • Mahdi Omrani
  • Masoud Shafiee
  • Siavash Khorsandi
Abstract:

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

full text

Cyber Attack Detection and Classification Using Parallel Support Vector Machine

Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection and classification methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the fi...

full text

Cyber Reconnaissance: An Alarm before Cyber Attack

Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Tod...

full text

Cyber Security Threats to Safety-critical, Space-based Infrastructures

Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of s...

full text

Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack

The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only in the sense of ...

full text

Modified vector attack on dengue

And her other organs were so covered in small white tumours it looked as if someone had filled her with pearls.” It was perhaps the ferocity of her cancer that made the cells grow successfully in the laboratory. “Henrietta’s cells weren’t merely surviving, they were growing with mythological intensity,” writes Skloot. “Soon they were being shipped to research institutes around the world, where ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 9  issue 33

pages  0- 0

publication date 2019-08

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023