مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,448
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

THE PASSIVE DEFENSE STRATEGIES AGAINST THE ADVANCED PERSISTENT THREATS IN THE CYBER ENVIRONMENT

Pages

  51-71

Abstract

 Considering the expanding INFORMATION TECHNOLOGY and human societies' increasing dependence on this technology, new threats have evolved as well. One of these threats are called ADVANCED PERSISTENT THREATS which- if not paid heed to- will have irreparable consequences for continuing activity on the part of human societies. ADVANCED PERSISTENT THREATS is one of the most important obsessions in today's human communities. They target particular organizations in order to steal information or incur losses on assets and properties. The present article is of applied type, being carried out via descriptive, analytical and survey methodology. This research method is used for providing a qualitative and objective description of the content of concepts based on a systematic method in order to explain PASSIVE DEFENSE STRATEGIES against ADVANCED PERSISTENT THREATS in the cyber environment. Therefore, the main question in this research is: "What are the PASSIVE DEFENSE STRATEGIES against ADVANCED PERSISTENT THREATS in the cyber environment? " And the sub-question being "What are the cyber threat indices?" In the present research, a documentary and library study as well as interview method has been used to compose the theoretical framework and literature. Finally, it concluded that any organization that has valuable information against the techniques used in ADVANCED PERSISTENT THREATS, is vulnerable. On the other hand, the more an organization's information has greater value, the more likely the organization will be exposed to threats.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    KAFEE, SAEED. (2016). THE PASSIVE DEFENSE STRATEGIES AGAINST THE ADVANCED PERSISTENT THREATS IN THE CYBER ENVIRONMENT. JOURNAL OF DEFENSE POLICY, 23(1 (93)), 51-71. SID. https://sid.ir/paper/261031/en

    Vancouver: Copy

    KAFEE SAEED. THE PASSIVE DEFENSE STRATEGIES AGAINST THE ADVANCED PERSISTENT THREATS IN THE CYBER ENVIRONMENT. JOURNAL OF DEFENSE POLICY[Internet]. 2016;23(1 (93)):51-71. Available from: https://sid.ir/paper/261031/en

    IEEE: Copy

    SAEED KAFEE, “THE PASSIVE DEFENSE STRATEGIES AGAINST THE ADVANCED PERSISTENT THREATS IN THE CYBER ENVIRONMENT,” JOURNAL OF DEFENSE POLICY, vol. 23, no. 1 (93), pp. 51–71, 2016, [Online]. Available: https://sid.ir/paper/261031/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button