جستارهای سیاسی معاصر

جستارهای سیاسی معاصر

بررسی تهدیدات جنگ سایبری و تاثیرات آن بر امنیت ملی ایران

نوع مقاله : علمی-پژوهشی

نویسندگان
1 دانشجوی دکتری تخصصی روابط بین الملل،واحد همدان،دانشگاه آزاداسلامی،همدان،ایران
2 دانشیار روابط بین الملل و عضو هیئت علمی،واحد همدان،دانشگاه آزاد اسلامی،همدان،ایران
3 دانشیار روابط بین الملل وعضو هیئت علمی،واحد همدان،دانشگاه آزاد اسلامی،همدان،ایران
10.30465/cps.2025.47967.3341
چکیده
با بروز انقلاب در فناوری اطلاعات در قرن بیست و یک و به وجود آمدن رسانه های جدید، مفهوم امنیت دستخوش تغییرات شگرفی شده و مؤلفه های اثرگذار در آن را نیز متحول کرده است و قدرت دولت ها را نیز با چالش جدیدی رو برو کرده است. هدف از این پژوهش، بررسی تاثیرات فضای سایبری بر امنیت ملی جمهوری اسلامی ایران در حوزه های مختلف بویژه حوزه های سیاسی-امنیتی می باشد. همچنین کشف نقاط ضعف و یا کاستی‌های موجود در حوزه امنیت سایبری با توجه به تهدیدات موجود در فضای مجازی از دیگر اهداف پژوهش حاضر می باشد که بصورت روش تحلیلی-توصیفی به این پرسش اساسی میخواهد پاسخ دهد که تهدیدات سایبری چگونه بر امنیت جمهوری اسلامی ایران تأثیر می‏گذارد؟امری که یافته های تحقیق بیانگر ان است که جمهوری اسلامی ایران یکی از مهمترین کشورهای هدف حملات سایبری در حوزه های مختلف بوده و از این نظرتسریع در تجهیز زیر ساختها وسرمایه گذاری در حوزه مقابله با تهدیدات سایبری ازجمله رویکردهای راهبردی ایران در این حوزه بشمار می رود که دراین پژوهش به واکاوی ابعاد بیشتر آن پرداخته می شود.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

Examining the threats of cyber warfare and its effects on Iran's national security

نویسندگان English

Behrouz Nasiri 1
Ghasem Toraby 2
Alireza Rezaei 3
1 PhD student in international relations, Hamedan Branch, Islamic Azad University, Hamedan, Iran
2 Associate Professor of International Relations and Faculty Member, Hamedan Branch, Islamic Azad University, Hamedan, Iran
3 Associate Professor of International Relations and Faculty Member, Hamedan Branch, Islamic Azad University, Hamedan, Iran
چکیده English

Abstract
Cyber threats have unique characteristics. On the one hand, these threats include a wide range of legal, technical, organizational, and cultural barriers, and on the other hand, low cost, tremendous impact, and lack of public transparency in cyberspace have led many actors to enter this field. This research examines the effects of cyberspace on the national security of the Islamic Republic of Iran in various fields, especially the political-security fields. Also, discovering the weaknesses and shortcomings in the field of cyber security with regard to the threats in the virtual space is one of the other goals of this research, which is analytical-descriptive. This basic question wants to answer how cyber threats affect the security of the Islamic Republic of Iran. The findings of the research show that the Islamic Republic of Iran is one of the most important countries targeted by cyber attacks in various fields, and from this point of view, the acceleration of infrastructure equipment and investment in the field of dealing with cyber threats, including Iran's strategic approaches are considered in this field, and in this research, more dimensions are analyzed.
  Keywords: cyber space, security threats, cyber            war, national security, artificial intelligence, Iran
1-Dr.Behrouz nasiri ph.D. in international relation,Hamadan Branch,IslamicAzad University,Hamadan,Iran.1364behnasiri@gmail.com
2-Dr.ghasem toraby  Professor of International Relations,HamadanBranch,IslamicAzad University,Hamadan,Iran  (corresponding Author)ghasemtoraby@yahoo.com
3-Dr.Alirezarezaei Associate Professor Of International Relations,Hamadan Branch,Islamic Azad University,Hamadan,Iran.alirezarezaei@gmail.com

Introduction
According to this group, today security threats are no longer solely military, but environmental issues, global poverty, migration and, more recently, cyber threats have endangered the security of states more than military threats. The discussion about cyber threats is influenced by the ongoing information revolution that results from the dynamics of the dissemination of information and communication technologies in all aspects of human life. As the dimensions of Internet services increase in various areas of human life, especially in business and commerce,computer attackers, thieves and information spies have greatly increased the volume of threats and damage caused by this technology.Today, in addition to expanding and becoming more complex day by day, these threats directly affect the national security of governments.Traditional concepts of war based on attack and defense have been challenged and rapidly changed by the complexities of cyberspace, and this threat has changed the traditional concepts of war in a way. The cyber threat is asymmetric and therefore,there is no need for a large investment to use it or attack through it.On the contrary,defense against cyber threats must consider all aspects, the costs of which are increasing today.The foundation of any country is based on a set of vital infrastructures in the sectors of communications,defense,energy, transportation,agriculture,health and economic affairs, which are interconnected by cyberspace as a nervous system. Today, there are many terrorist acts in cyberspace targeting governments, and the characteristics of these attacks include the unknown nature and speed of the attacks, and most of these attacks are identified after they occur.Also,todiscover the weaknesses and shortcomings in the field of cyber security with regard to the threats in the cyberspace is one of the other goals of this research. It wants toanswer the basic question of how cyber threats affect the security of the Islamic Republic of Iran in a descriptive-analytical method. Thefindings of the research show that the Islamic Republic of Iran is one of themost important countries targeted by cyber attacks in various fields. From thispoint ofview, acceleration ininfrastructure equipment and investment in the field of dealing with cyber threats is considered as oneofIran's strategic approaches in this field, which is analyzed in this research.
Materials and Methods
 The method of work in this research is library, descriptive-analytical. First, we study historical written works, documents, and research conducted on the effects of cyberspace and virtual networks on values at different levels, then we analyze the data from the questionnaires and streams, and finally we compile and write the research. The method of work in this research is library, descriptive-analytical. First, we study historical written works, documents, and research conducted on the effects of cyberspace and virtual networks on values at different levels, then we analyze the data from the questionnaires and streams, and finally we compile and write the research
Discussion and Results
Technology has always played a decisive role in shaping human life, but with the passage of time and the advancement of technology,the influence of this phenomenon on human life has intensified. Many consider the Industrial Revolution in the eighteenth century to be a turning point in this direction. The consequence of the Industrial Revolution was the emergence of more complex technologies that increasingly overshadowed the developments of human societies. These technologies increased the exchanges and the relative complexity of human relationships. The characteristic of all technological revolutions is that they affect the entire sphere of human activity, in the sense that they act as the context in which human activity takes place.Since the 1970s, technological progress has accelerated at a rapid pace, to the point where it can now be said that the machine, as the infrastructure for producing weapons to ensure security,has given way to information and communication technologies,and as a result,has become central to military strategies. This situation has dangerously increased the vulnerabilities of societies and made security threats more complex than ever. In addition,it has enabled the emergence of new actors in the global arena and has strengthened the capacity of non-state actors to influence international trends and dynamics, including security, by utilizing new information and communication technologies.At the same time,alongside the real world, a virtual world has emerged in which state and non-state actors, free from the limitations of the real world, play a role. The most important feature of the new space is the uncontrollability of interactions and the changing nature of many concepts such as war and victory. Changes in the tools and methods of battle have created new forms of war, such as information warfare, in cyberspace, according to which victory no longer means achieving goals by defeating the enemy by resorting to violent means; rather,victory means achieving goals without bloodshed and conflict.
Some consider the virtual sphere to be the fifth domain of battle.Military analysts have recognized the cyber domain as a new domain in warfare whose importance is now surpassing that of other domains.The absence of international law has allowed each country to engage in virtual or cyber war against another country.
Conclusion
The purpose of a cyber attack is to access information from other countries,disrupt trade,or damage infrastructure such as water,electricity,transportation,etc. in a way that increases economic costs. In recent years,the number of cyber attacks worldwide has increased significantly. The starting point of virtual war is considered to be the Balkan War,when opposing forces tried to infiltrate each other's information. Today, the growth of computer networks is much faster than the growth of security software related to them. There is still not enough infrastructure to prevent cyber attacks in countries' computer systems. Cyberspace has become a potential place for such crimes.Billions of dollars are transferred in cyberspace daily without the slightest security,and some of the most important government and personal information exists in cyberspace without the slightest security, increasing the risk of cyberattacks.Finally, in this research, we will examine the negative effects of cyber threats on changing the dimensions of national security and the resulting security crisis, and finally, the strategic warnings necessary to overcome this security crisis affected by cyber threats.

کلیدواژه‌ها English

cyber space
security threats
cyber war
national security
artificial intelligence
Iran
▪    ابراهیمیان، بهمن؛ توشه، علی و پورهادی، ابراهیم (1394)، «راهکارهای مقابله با تهدیدهای سایبری علیه جمهوری اسلامی ایران با تأکید بر نقش فن‌آوری و منابع انسانی»، فصلنامه راهبرد دفاعی، سال سیزدهم، شماره 50، ص 87-115. 
▪    اسلامی، مسعود (1369)، «جایگاه و موقعیت کشورهای کوچک در نظام بین‌المللی»، مجله سیاست خارجی، سال 4، شماره 4.
▪    بمان اقبالی زارچ، علی (1401)، «تهدیدات و حملات سایبری بر علیه ایران»، مرکز مطالعات سیاسی و بین‌المللی IPIS.
▪    بیات کاه‌دان، محمد و جعفری، عیسی (1402)،  «مصنوعی در امنیت سایبری» هجدهمین کنفرانس ملی مهندسی برق، کامپیوتر و مکانیک، شیروان https://civilica.com/doc/1686186.
▪    تاجیک، محمدرضا (1382)، «مقدمه‌ای بر استراتژی‌های امنیت ملی ج.ا.ا رهیافت‌ها و راهبردها»، نشر فرهنگ گفتمان.
▪    ترابی، قاسم (1397). «چالش‌ها و آسیب‌پذیری‌های جمهوری اسلامی ایران در فضای سایبر»، مطالعات راهبردی، سال 21، شماره 1.
▪    تریف، تری و دیگران (1383)، «مطالعات امنیتی نوین»، مترجمین علیرضا طیب ووحید بزرگی، تهران: پژوهشکده مطالعات راهبردی.
▪    _____ «حملات سایبری و میدان جنگ الکترونیک»، سایت وزارت فرهنگ و ارشاد اسلامی https://herasat.farhang.gov.ir/fa/articl/cyberattaks/cyberattaks5
▪    صیاد، محمدکاظم؛ امینی، آرمین و طاهری، ابوالقاسم (1399)، «تهدیدهای سایبری و اقدامات امنیتی در فضای مجازی- بررسی رویکردهای ایالات‌متحده آمریکا و جمهوری اسلامی ایران»، فصلنامه علمی امنیت ملی، سال 10، شماره 38.
▪    عبدالله خانی، علی (1389)، «جنگ نبرد 3، نبرد در عصر اطلاعات»، موسسه فرهنگی مطالعاتی و تحقیقات بین‌المللی ابرار معاصر تهران.
▪    عبدالله خانی، علی (1382)، «نظریه‌های امنیت: مقدمه‌ای بر طرح‌ریزی دکترین امنیت ملی(1)»، جلد اول، تهران: مؤسسه فرهنگی مطالعات و تحقیقات ابرار معاصر تهران.
▪    عسگرخانی، ابومحمد و رحمتی، رضا (1389)، «نظریه واقع‌گرایی و امنیت بین‌الملل» فصلنامه سیاست خارجی، سال 24،شماره 1.
▪    طالب‌پور، عطیه (1398)، «تاریخچه حملات سایبری در ایران و جهان»، خبرگزاری باشگاه خبرنگاران جوان، 21 بهمن 1398.
▪    رئیسی،لیلا(1402)«صیانت ازحقوق شهروندان درفضای سایبردرپرتونسل سوم حقوق بشرباتاکید برحقوق ایران»،فصلنامه مطالعات بین الملل،سال20،شماره 3،زمستان1402
▪    سایت خبری اقتصاد نیوز به نشانی:1402/09/27www.eghtesadnews.com
▪    صدوقی، مرادعلی (1384)، «تکنولوژی اطلاعاتی و حاکمیت ملی»، تهران، وزارت امور خارجه.
▪    قاسمی، ح (1372)، «برداشت‌های متفاوت از امنیت ملی»، مجله سیاست دفاعی، سال اول، شماره 2.
▪    کاظمی، علی‌اصغر (1370)، «مدیریت بحران‌های بین‌المللی»، تهران، دفتر نشر فرهنگ اسلامی.
▪    مرادیان، امید (1402)، «هوش مصنوعی در امنیت سایبری»، آکادمی محسن مدحج.
▪    هافندورن، هلگا (1371)، «معمای امنیت»، ترجمه علیرضا طیب، مجله سیاست خارجی، شماره 4.
▪    یزدان فام، محمود (1386)، «دگرگونی در نظریه‌ها و مفهوم امنیت بین‌الملل»، فصلنامه مطالعات راهبردی، شماره 38،