Origins of Cyber Security: Short Report

Document Type : Review Article

Authors

1 Iranian Social Security Organization, Shiraz, Iran

2 Department of Psychology, Human Science Faculty, Islamic Azad University, Ghods City Branch, Iran

3 Department of educational management, Human Science Faculty, Islamic Azad University, Ahvaz Branch, Iran.

Abstract

Security is the most basic need of any society and the most important factor for the sustainability of social life; therefore, it has been the focus of experts and theorists since the distant past. The spread of the Internet, new information and communication technologies, and the communication revolution have created a new type of virtual communication devoid of the spirit that governs real social relations. This has caused the emergence and formation of cyberspace parallel to the real world and has disrupted the equations and patterns of traditional communication, production, transfer, and consumption of information and has caused a global movement in the field of communication and transfer of content and communication messages in the fastest possible time. Therefore, as human life is mixed with the cyber revolution, cyber security has come. Cyber security is security in the infrastructure and information arteries, and creating new opportunities for jobs and countries in the environment of automation, electronic commerce, exchange, and cooperation has led to targeted production, storage, and exploitation of sensitive and vital information. In general, different aspects of citizens' lives are mixed with cyberspace, and any instability, insecurity and challenges in this space directly affect different aspects of citizens' lives, especially their security.

Keywords

Main Subjects


  1. Gurbanpour and M. Gurbanpour, “The concept of national security and the role of the constitution of the Islamic Republic of Iran in providing it,” the first festival of the best scientific works of Islamic humanities, Allameh Jafari special award, 2018, [online]. Available: https://www.sid.ir/paper/899421/fa (in Persian).
  2. Abedi,“Investigating the concept of cyber security,” the second national cyber defense conference, Maragheh, 2019, [online]. Available: https://civilica.com/doc/903740/ (in Persian).
  3. Sharifi Rahnmo, A. Fathi, E. Emrani, M. Sharif irahnmo, B. Zare kohan and M. Ebrahimi, “Forecasting Components of Youth Cultural Security based on the Degree of Attachment to Cyberspace,” Societal Security Studies, vol. 12, no. 65, pp. 69-88, 2021, [Online]. Available: https://www.magiran.com/paper/2283781 (in Persian).
  4. De Kimpe, K. Ponnet, M. Walrave, T. Snaphaan, L. Pauwels and W. Hardyns, “Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims,” Computers in human behavior, vol. 108, pp. 106310, 2020, doi: https://doi.org/10.1016/j.chb.2020.106310
  5. C.B. Umanailo, I. Fachruddin, D. Mayasari, R. Kurniawan, D.N. Agustin, R. Ganefwati and R. Fitriana, “Cybercrime case as impact development of communication technology that troubling society,” Int. J. Sci. Technol. Res, vol. 8, no. 9, pp. 1224-1228, 2019, [Online]. Available: http://repository.unisbablitar.ac.id/id/eprint/703
  6. Sayyadi Tooranloo, H. Mirghafoori, M. Mahdavi and S. Saghafi, “Analysis of factors related to the establishment of Cybercrime using a Fuzzy approach,” Order & Security Research Journal, vol. 13, no. 3, pp. 27-54, 2020, [Online]. Available: https://www.magiran.com/paper/2169236/ [in (in Persian).
  7. Jahbin, A. Mozaffari, N. Hashemzehi and S.M. Daddaran, “Qualitative study of the causes of criminality in cyberspace (qualitative analysis of cybercrime cases),” Journal of Socio - Cultural Changes, vol. 15, no. 4, pp. 48-71, 2019, [Online]. Available: https://journal.khalkhal.iau.ir/article_664263.html (in Persian).
  8. Toraby and M.N. Taherizadeh, “The Cyber Revolution and The Evolution of the Concept of Information Warfare in the Field of International Relations,” International Studies Journal (ISJ), vol. 17, no. 4, pp. 47-65, 2021, doi: 10.22034/isj.2021.279939.1432 (in Persian).
  9. Katanchi and B. Pourghahramani, “Cyber Security Challenges in ASEAN Countries,” International Studies Journal (ISJ), vol. 18, no. 1, pp.139-156, 2021, doi: 10.22034/isj.2021.252695.1237 (in Persian).
  10. ISO, “Guidelines for Cyber Security,” 2018, [Online]. Available: http://www.iso27001security.com/html/27032.html.
  11. International Telecommunications Union (ITU). X. 1205: “Overview of Cyber Security,” 2018, [Online]. Available: https://www.itu.int/rec/T-REC-X.1205-200804-I
  12. Stallings, “Cryptography and network security, 4/E,” Pearson Education India, 2006, [Online]. Available: http://hdl.handle.net/1/5304
  13. Smit, “Cyberbullying in South African and American schools: A legal comparative study,” South African Journal of Education, Vol. 1, no. 35(2), pp. 1-1, 2015, doi: 10.15700/saje.v35n2a1076
  14. Michel, ME. Kabay, E. Salveggio, R. Guess and RD. Rosco, “Computer Security Handbook (6th ed.),” Wiley [Online Library], 2015, ISBN: 9781118134115.
  15. Parkinson, P. Ward, K. Wilson and J. Miller, “Cyber threats facing autonomous and connected vehicles: Future challenges,” IEEE transactions on intelligent transportation systems, Vol. 6, no. 18(11), pp. 2898-915, 2017, doi: 10.1109/TITS.2017.2665968
  16. Roy, C. Chowdhury and N. Aslam, “Security and privacy issues in wireless sensor and body area networks. Handbook of Computer Networks and Cyber Security,” Principles and Paradigms, Vol. 1, no. 1, pp. 173-200, 2020, [Online]. Available: doi: 10.1007/978-3-030-22277-2_7
  17. Conti, T. Dargahi and A. Dehghantanha, “Cyber threat intelligence: challenges and opportunities,” Springer International Publishing, 2018, doi:10.1007/978-3-319-73951-9_1
  18. Ruohonen, “An acid test for Europeanization: Public cyber security procurement in the European Union,” European Journal for Security Research, Vol. 5, no. 2, pp. 349-77, 2020, doi: 10.1007/s41125-019-00053-w
  19. Hasan, AA. Habib, Z. Shukur, F. Ibrahim and S. Islam, “Razzaque. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations,” Journal of Network and Computer Applications, Vol. 1, no. 209, pp. 103540, 2023, doi: https://doi.org/10.1016/j.jnca.2022.103540
  20. Avancini, JJ. Rodrigues, RA. Rabêlo, AK. Das, S. Kozlov and P. Solic, “A new IoTā€based smart energy meter for smart grids,” International Journal of Energy Research, Vol. 45, no. 1, pp. 189-202, 2021, doi: https://doi.org/10.1002/er.5177
  21. Abrahamsen and Y. Ai, “Cheffena. Communication technologies for smart grid: A comprehensive survey,” Sensors. Vol. 3, no. 21(23), pp. 80-87, 2021, doi: https://doi.org/10.3390/s21238087
  22. Ahmed, TM. Gondal, M. Adil, SA. Malik and R. Qureshi, “A survey on communication technologies in smart grid,” In2019 IEEE PES GTD Grand International Conference and Exposition Asia (GTD Asia), IEEE. Vol. 1, no. 1, pp. 7-12, 2019, doi: 10.1109/GTDAsia.2019.8715993
  23. Czekster, C. Morisset, AV. Moorsel, JC. Mace, WA. Bassage and JA. Clark, “Cybersecurity Roadmap for active buildings,” InActive Building Energy Systems: Operation and Control. Cham: Springer International Publishing, Vol. 1, no. 1, pp. 219-249, 2021, doi: 10.1007/978-3-030-79742-3_9
  24. Kazemy and M. Hajatipour, “Event-triggered load frequency control of Markovian jump interconnected power systems under denial-of-service attacks,” International Journal of Electrical Power & Energy Systems, Vol. 1, no. 133, pp. 107250, 2021, doi: https://doi.org/10.1016/j.ijepes.2021.107250
  25. Al-Hawawreh, A. Aljuhani and Y. Jararweh, “Chatgpt for cybersecurity: practical applications, challenges, and future directions,” Cluster Computing, Vol. 26, no. 6, pp. 3421-36, 2023, doi: https://doi.org/10.1007/s10586-023-04124-5
  26. Arora, “Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science,” Vol. 1, no. 8, pp. 540-2, 2016, doi: https://doi.org/10.1016/j.pisc.2016.06.014
  27. Rowe, BM. Lunt and JJ. Ekstrom, “The role of cyber-security in information technology education,” In Proceedings of the 2011 conference on Information technology education, Vol. 1, no. 1, pp. 113-122, 2011, doi: https://dl.acm.org/doi/abs/10.1145/2047594.2047628
  28. Jasper, “US cyber threat intelligence sharing frameworks,” International Journal of Intelligence and Counter Intelligence, vol. 2, no. 30(1), pp. 53-65, 2017, doi: https://doi.org/10.1080/08850607.2016.1230701
  29. Wagner, E. Palomar, K. Mahbub and AE. Abdallah, “A novel trust taxonomy for shared cyber threat intelligence,” Security and Communication Networks, Vol. 1, no. 1, pp. 1-9, 2018, doi: https://doi.org/10.1155/2018/9634507
  30. Thomas, A. Vijayaraghavan and S. Emmanuel, “Machine Learning and Cybersecurity. In: Machine Learning Approaches in Cyber Security Analytics,” Springer, Singapore, Vol. 1, no. 1, pp. 37-47, 2020, doi: https://doi.org/10.1007/978-981-15-1706-8_3
  31. Von Solms and J. Van Niekerk, “From information security to cyber security,” computers & security, Vol. 1, no. 38, pp. 97-102, 2013, doi:https://doi.org/10.1016/j.cose.2013.04.004
  32. “UKCyber Security Strategy”. National Cyber Security Strategy 2016 to 2021, [Online]. Available:  https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
  33. Pipyros, C. Thraskias, L. Mitrou, D. Gritzalis and T. Apostolopoulos, “A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual,” Computers & Security, Vol. 1, no. 74, pp. 371-83, 2018, doi: https://doi.org/10.1016/j.cose.2017.04.007
  34. Fiedelholtz, “Incident Response and Recovery,” The Cyber Security Network Guide, Vol. 1, no. 1, pp. 31-8, 2021, doi: https://doi.org/10.1007/978-3-030-61591-8_4.
  35. Sarker, “Smart City Data Science: Towards data-driven smart cities with open research issues,” Internet of Things, vol. 1, no. 19, pp. 100528, 2022, doi: https://doi.org/10.1016/j.iot.2022.100528
  36. Sarker, AI. Khan, YB. Abushark and F. Alsolami. “Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions,” Mobile Networks and Applications, Vol. 28, no. 1, pp. 296-312, 2023, doi: https://doi.org/10.20944/preprints202203.0087.v1
  37. Sarker, “Machine learning: Algorithms, real-world applications and research directions,” SN computer science, Vol. 2, no. 3, pp. 160, 2021, doi: 10.1007/s42979-021-00592-x
  38. Sarker, “CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks,” Internet of Things, Vol. 1, no. 14, pp. 100393, 2021, doi: https://doi.org/10.1016/j.iot.2021.100393
  39. Ghahremani and E. Amini, “Analyzing the Health of Urban Streets with an Emphasis on the Components of Residents' Perceived Safety (Case Study: District 4 of Tehran Municipality),” Journal of Social Order, vol. 13, no. 4, pp. 35-62, 2021, doi: 20.1001.1.20086024.1400.13.4.2.2 (in Persian).
  40. Niazi, Z. rezvani and Z. Sadeqiarani, “Presenting an interactive model of social security using structural modeling,” Societal Security Studies, vol. 13, no. 70, pp. 25-49, 2022, doi:10.22034/sss.2022.98069 (in Persian).
  41. Yazdani and M. Jami Odolo, “Assessing the social damage of Covid-19 on the feeling of social security in public spaces (case example: Ardabil city),” Scientific Quarterly Journal of Social Security Studies, vol. 13, no. 69, pp. 153-174, 2022, [Online]. Available: https://ecc.isc.ac/showJournal/1957/272215/3453802  (in Persian).
  42. Hayaty and L. Nourmohamadi dehbalai, “Assessing and Evaluating Women's Security Factors in Urban Parks Stressing Social Productivity and Surrounding Security (Case Study: Ilam's "Koodak Park"),” Societal Security Studies, vol. 12, no. 1, pp. 115-140, 2021, [Online]. Available: http://sss.jrl.police.ir/article_96159.html (in Persian).
  43. Khalili and H. Mehraban inchebroun, “Identity policy, education and national security in Iran,” Strategic Studies Quarterly, vol. 24, no. 94, pp. 39-70, 2021, doi: 20.1001.1.17350727.1400.24.94.2.0 (in Persian).
  44. Shahbazi, A. Foroutan Ramy and B. Sadeghi Amroubadi, “Transparency and economic security; Functional analysis of intelligence Services,” Strategic Studies Quarterly, vol. 24, no. 94, pp. 177-217, 2021, doi: 20.1001.1.17350727.1400.24.94.6.4 (in Persian).
  45. Seifi, M. Khaleqinejad and H. Rezaiee, “A constructivist approach to the concept of human security,” Strategic Management Studies of National Defence Studies, vol. 9, no. 34, pp. 161-143, 2019, doi: 20.1001.1.24234621.1398.9.34.5.0 (in Persian).
  46. Mohammadi Khanghahi and M.H. Azadi, “Social Cybersecurity (The Role of Social media in Information wars),” National Security, vol. 11, no. 41, pp. 131-158, 2021, doi: 20.1001.1.33292538.1400.11.41.5.3 (in Persian).
  47. M. Saadatmand, M.R. Karimi Ghohrodi, H. Mohammadi and M. Babak, “Determining the indicators of cyber security evaluation by comparative study method,” National Security, vol. 11, no. 40, pp. 37-66, 2021, doi:20.1001.1.33292538.1400.11.40.2.8 (in Persian).
  48. Kavyani, N. Mirsepassi and G. Memarzadehtehran. “Designing a personnel Competency Model in Cybersecurity,” Strategic Management Studies of National Defence Studies, vol. 10, no. 41, pp. 298-273, 2021, doi:20.1001.1.24234621.1399.10.41.11.7(in Persian).