Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension
Objective: This study aims to clarify the components and indicators of cyber power within the defensive-security dimension. Methodology: The research is applied and developmental in terms of its objective, descriptive-case study in terms of its nature, and uses a mixed (qualitative and quantitative)...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
AJA Command and Staff University
2024-12-01
|
| Series: | علوم و فنون نظامی |
| Subjects: | |
| Online Access: | https://www.qjmst.ir/article_720082_261bd387ea244ed1af0310bdb98ea0c5.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Objective: This study aims to clarify the components and indicators of cyber power within the defensive-security dimension.
Methodology: The research is applied and developmental in terms of its objective, descriptive-case study in terms of its nature, and uses a mixed (qualitative and quantitative) approach for data analysis. The statistical population of this study consists of 50 experts and specialists in the field of cyberspace. For the statistical analysis of quantitative data, the data collected from a researcher-designed questionnaire were examined using Smart PLS software.
Findings: The results of the study led to the identification of four components within the defensive-security dimension of cyber power: the development of cyber defense and passive defense, strengthening the cybersecurity of critical and sensitive infrastructures, equipping with cyber technologies and weapons for deterrence, and organizing and structuring specialized cyber forces. Additionally, 41 indicators were identified.
Conclusion: Overall, the study showed that efforts to achieve indigenous knowledge, establish a cyber command and control center, enhance cybersecurity indicators, and acquire the necessary readiness to counter cyber threats in the defensive-security dimension are of significant importance. A thorough understanding and recognition of this issue by elites and policymakers will lead to the development of policies and plans for securing cyber resources, equipping with advanced technologies, and strengthening cyber power in this field. |
|---|---|
| ISSN: | 2008-191X 2676-4520 |