[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 13, Issue 1 (8-2024) ::
منادی 2024, 13(1): 74-88 Back to browse issues page
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements
Nasrin Taaj *1 , Amir Mansour Yadegari , Abouzar Arabsorkhi , Reza Kalantari
Abstract:   (1091 Views)
The development of the country's infrastructure as an independent, safe and stable infrastructure is one of the strategic priorities of the country, the realization of which, in addition to the technological requirements in the field of information and communication technology, laying the foundation for the establishment, development and supply of various services and content of the country's cyber space, requires the provision of secure communications. And the vital infrastructure of the country is also stable.
Based on the conceptual model contained in the resolution of the 66th meeting of the Supreme Council of Cyberspace, the communication and information infrastructure of the country consists of a series of main modules, whose risk analysis is in line with the reversibility in accidents, protection against threats, monitoring and intelligent response from the basic needs of communication access. It is safe and secure. Due to the space limitations of this article, the author intends to explain how to achieve multi-sample risk analysis from these basic modules and then based on the results, how to exploit the emerging knowledge in the form of a diagram to identify the type of threat and its source and extract Explain the mentioned preventive requirements.
Article number: 5
Keywords: Threats and vulnerabilities, risk analysis method, source and type of threat, security requirements
Full-Text [PDF 1451 kb]   (535 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2024/05/7 | Accepted: 2024/09/25 | Published: 2024/10/28
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Taaj N, Yadegari A M, Arabsorkhi A, Kalantari R. The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements. منادی 2024; 13 (1) : 5
URL: http://monadi.isc.org.ir/article-1-275-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 13, Issue 1 (8-2024) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.03 seconds with 39 queries by YEKTAWEB 4710