• List of Articles امنيت

      • Open Access Article

        1 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
        Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation More
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Manuscript profile
      • Open Access Article

        2 - Shanghai Organization and the Security of Central Asia
        الهه  كولايي
        Iran became an observer member of the Shanghai Organization on 2005. Considering the reasons behind the formation of this organization and the transformation process it went through, this event has led to serious debates on how Iran can cooperate with this Organization. More
        Iran became an observer member of the Shanghai Organization on 2005. Considering the reasons behind the formation of this organization and the transformation process it went through, this event has led to serious debates on how Iran can cooperate with this Organization. "Shanghai Five" group was first established to resolve security and border related problems between China, Russia and CIS countries (except Uzbekistan and Turkmenistan). Later, when Uzbekistan joined Shanghai Five, the group was promoted to organization level. Although many changes have taken place during the transformation process of this regional security cooperation and some economic problems have also been taken into consideration, but basically this Organization has paid more attention to security and military problems in general. The main question brought forth in this article is: "What is Shanghai Organization's role in providing the secrutiy of Central Asia?" The article studies the transformation process taken place in this Organization , so that its role as the provider of secrutiy in Central Asia is illustrated. Manuscript profile
      • Open Access Article

        3 - The honorable security of human; a preeminent basis in citizenship rights
        علیرضا انتظاری  
        From the viewpoint of The Glorious Quran, noting people and government to the natural and acquired dignity of the whole individuals of a society and observing its necessities cause to decamp all kinds of oppression, discrimination, despotism and suffocation from an Isla More
        From the viewpoint of The Glorious Quran, noting people and government to the natural and acquired dignity of the whole individuals of a society and observing its necessities cause to decamp all kinds of oppression, discrimination, despotism and suffocation from an Islamic society and one of the main components of the human civilization and bliss that is "mundane and heavenly security" be set up as a main characteristic in the citizenship rights by social training. The importance of the security is considered from the point of view of the human dignity in Islam and, moreover, mechanisms hereby have considered to incarnate it in this research Manuscript profile
      • Open Access Article

        4 - Ethical Conflict of Decisions of the International Court of Justice and the Security Council on the Peaceful Settlement of International Disputes
        Saeedeh  Golkar Seyed Mohammad  Hashemi Ali  Zare
        In the present study the structure, some considerations on the respective rolls of the security council and the internationalcourt of justice with respect to the “The revention of aggravation of disputes” in the domain of the pacific settlementof international disputes More
        In the present study the structure, some considerations on the respective rolls of the security council and the internationalcourt of justice with respect to the “The revention of aggravation of disputes” in the domain of the pacific settlementof international disputes or situations, according to the United Nations charter through comparing their functions and functionalities. Special focus is on the International Court of Justice (ICJ) as the sole United Nations judicial institution that carries not only the responsibility of peaceful resolution of international disputes between states and other subjects of international law but also has contributed to the expansion of international law. ICJ has a responsibility to supervise other organs of the United Nations but has failed to observe the resolutions of the Security Council despite the freedoms it enjoys to do so. The authority of the Security Council is still derived from the will of powers, not the international law which has resulted in silence and inaction of the ICJ with regard to the decisions of the Security Council in the cases of Lockerbie, Namibia, Bosnia and Herzegovinian and Montenegro; all out of political considerations. The study ends with a conclusion and a set of recommendations to minimize the adverse effects of the discussed contradictions including legal observations supported by some international principles and procedures as well as acceptance of the superiority of the decisions of the ICJ over decisions of other main UN bodies particularly the Security Council. Manuscript profile
      • Open Access Article

        5 - The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95
        Abbas Ali  Shahidi
        The impact of the religious in the security of society, emphasis on the theoretical functions on this subject, inability of the police to create sense of security and control , especially on the young people and student are topics which have always been considered. Th More
        The impact of the religious in the security of society, emphasis on the theoretical functions on this subject, inability of the police to create sense of security and control , especially on the young people and student are topics which have always been considered. The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95. Our method was descriptive-correlative. Our population was all of the bachelor student of arak university. Samples were estimated with the randomized random sampling , according to the Morgan and Kerjsi table. They are 366. The collecting tools was questionnaire about doing religious beliefs, sense of social security. Data analysis was performed on 366 subject, with use of multivariate correlation method and regression ( 85 students of arak university, 111 students from payame noor university, 50 students from faculty of medical sciences , 117 people from arak azad university). Our finding show that, there is positive relation between doing religious belief and sense of social security among students. Considering the subject that doing religious beliefs is a good predicator for sense of security, so; we can reinforce the belief among the students with offering the best solution. Doing the religious orders is one of the best way for sense of security among students. Manuscript profile
      • Open Access Article

        6 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information se More
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information security in the company. It is based on privacy standards, integrity and availability of information assets. In the present report, not only a model for evaluating the information security maturity in the headquarters of one of the oil industry companies is developed, but also the defect analysis and implementation of the existing organization are initially carried out in accordance with the requirements of ISO 27000. By defining the indicators of evaluation and measurement of these indicators in the organization, its maturity is estimated in this security standard. Different models are presented to identify the weaknesses and security powers of a particular organization. The goal is to identify a gap between theory and practice that can be approximated by the process-oriented approach. The puberty model introduced and used in this project, provides a starting point for implementing security, a public view of security, and a framework for prioritizing operations. This model of information security maturity has 5 phases. (The maturity model is information security as a tool for assessing the ability of organizations to meet security goals, that is, confidentiality, integrity and availability, and prevent attacks and access to the mission of the organization in spite of attacks and accidents)??. This model defines a process that has all aspects of security management, measurement, and control. The results of the evaluation show that the organizations which have security investments ahead of time have to understand the needs for high-level management of information security in the organization, and in addition to the actions taken in the field of physical environment, network and personal computers, controls access and encryption have been made to identify the necessary training and culture. Manuscript profile
      • Open Access Article

        7 - Designing a model based on blockchain technology to strengthen cyber security in the banking industry
        hossein amoozadkhalili neda haghi Reza Tavakkoli-Moghaddam
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on More
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on blockchain technology to strengthen cyber security in the banking industry based on artificial neural networks. This model is based on a conceptual model used in an MLP neural network simulation that simulates a blockchain-like process. Also, the neural networks created in the block chain have a strong connection and the possibility of breaking them is low. The data became closer to normal distribution after learning, indicating that blockchain technology will be able to provide cyber security. The level of correlation and efficiency presented was also reported and the findings of the study showed that the efficiency related to blockchain technologies after learning reached the level of 770.57 units, which shows that using the MLP method to learn the process of blockchain technology can be Lead to greater efficiency for cyber security. Also, the value of variance is equal to 27.77 and the mean value of computational values is equal to 0.35 and the value of correlation is equal to 0.99. Manuscript profile
      • Open Access Article

        8 - Socio-cultural impact assessment of establishing Marvdasht sports complex (Tehran municipal region7)
        Khalil  Mirzaei Marjan  Pakdaman Farzad  Abbasi neda Azimi
        The present study seeks to respond to Qasr-Heshmatieh neighborhood residents’ needs regarding sports facilities. Some of the most important goals of this project include impacts such as direct and indirect empowering and informing the residents on health issues, providi More
        The present study seeks to respond to Qasr-Heshmatieh neighborhood residents’ needs regarding sports facilities. Some of the most important goals of this project include impacts such as direct and indirect empowering and informing the residents on health issues, providing access to sports facilities, establishing public spaces and increasing social interactions in those spaces, increasing perceived safety and health for the residents of Qasr-Heshmatieh neighborhood due to the existence of a safe place for doing sports, improving residents’ physical health due to easier accessibility to sports facilities and equipment compared to the past, increasing the visits from other parts of the region to use the facilities and building new interaction, etc. The present study is descriptive in terms of process and applied in terms of the research objective. Documentary and field study were also used for data collection. However, it must be mentioned that the present study can also be categorized among assessment studies. The establishment of Marvdasht sports complex in Tehran municipal region 7 has both positive and negative impacts. The positive impacts include increasing social relations, social capital, safety for women, health, participation in sports activities, reducing addiction rate, change in the lifestyle, employment, creation of new jobs, revenue gain for the municipality, and reducing noise from teenagers and the youth, while negative impacts include environmental pollution, increased traffic, parking space shortage, and congestion and crowdedness in the neighborhood. Manuscript profile
      • Open Access Article

        9 - Investigating weapons of mass destruction with a focus on moral values in jurisprudence and international law
        Mohsen Reza  Mosaddegh khah Morteza  Barati Hasan Soleimani
        Along the roaring waves of the development of contemporary modern technology, we witness the emergence of weapons of mass destruction such as nuclear weapons, biological weapons, etc., with a special index of destructive power and inseparability in the targets. And, amo More
        Along the roaring waves of the development of contemporary modern technology, we witness the emergence of weapons of mass destruction such as nuclear weapons, biological weapons, etc., with a special index of destructive power and inseparability in the targets. And, among the secondary headings that will change the verdict is the rule of necessity, the prohibition of prohibitions, with its occurrence, the obligation is removed from the duty of the obligee, and the result of that is the permission to commit a forbidden act. Among other secondary headings is the rule of countering with like in legitimate defense. According to the results of the research, the use of weapons of mass destruction under secondary headings is also not allowed. However, in the sources of international law, such as the NPT, the United Nations Charter, and the consultation of the International Court of Justice in 1996, there was no clear reason to prohibit the use of weapons of mass destruction, and the use of this type of weapon for the legitimate defense of the country was allowed. Therefore, based on the arguments of Arbaah and the general provisions of international law treaties and for the purpose of legitimate defense and neutralization of modern weapons of war, with research and development and the acquisition of modern technology in order to create a suitable platform for the prevention of treatment, preservation and protection from the Islamic government, ensuring national security, human dignity, for example "Wa'adolham Mastatetam Potential" has taken action so that the Islamic homeland is mastered and equipped with modern weapons of war and relevant antidotes in special circumstances, especially in the form of legitimate and obligatory defense. Also, what can be inferred from Islamic ethics is that based on the teachings of Islam, from the Holy Book to the traditions, there are documents in the field of weapons of mass destruction, all of which emphasize the prohibition of the use of weapons of mass destruction and the use of such weapons in any The face is inhuman and immoral. Manuscript profile
      • Open Access Article

        10 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this fie More
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives are secure models, security models, and the framework and system to security models. The first and last perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research are presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. It is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, include agile patterns as well. Based on this idea and related analyzes, the atmosphere of future research activities will be revealed to the audience. Manuscript profile