Developing security awareness programs from the perspective of cyber defense


Cybersecurity can be an effective way to deal with the exacerbation of risks, the risks that can be gained by increasing malicious gamers using cybercrime, for personal gain or for malicious attacks against key infrastructure of governments and communities, have been created. With the increasing use of cyber-equipment in social, economic, and, in general, human-resource-related vulnerabilities will multiply over time in the medium to long term.

Thus, recent efforts to cyber intervention, especially press releases, on the extent and nature of the Chinese spy program, known as “Shady Rat,” which has infiltrated dozens of companies, government services, and international organizations, suggests that Cyber ​​space has become a relatively deep-seated conflict scene to solve the challenges of using offensive action based on the logic of self-defense.

In the framework of cooperation with countries that share our belief in the information networks, especially the Internet, we must develop effective defenses and allocations. These collaborations include a variety of issues including respect for norms, information exchange, coordination of alert and detection systems, attack response training, and, finally, creating conditions under which the government they can make common intelligence and physical actions identifying actors or their commanders.

Finally, while developing cyber defense in order to respond to the rapid evolution of threats, it seems necessary and necessary, but there are many challenges in creating it. At the moment, it seems that America alone has the equipment and structures that allow them to master these challenges. The NSA, supervised by Cyber ​​Command, thanks to the availability of the Ashleon network and data processing capabilities, appears to be one of the finest global organizations that can analyze the digital data on Networks are transmitted across the globe and can quickly identify all systems involved in an attack.

However, Washington cannot hope to operate such a system on its own. Therefore, it seeks to expand its partnerships with its allies, thereby, on the other hand, to the research facilities of other governments, to endeavor to Facilitating the identification of authorities for a deep offensive and, on the other hand, strengthening its deterrent measures by its allies.

A commitment to using the best results in these reviews is essential. The US government and politics are eager to face a crisis and failure to design new policies or seek quick solutions and examine the issue. In any organization, it’s difficult to transfer funds from steady plans to creative and new ones. Especially in the US government, the fundamentals of the country’s budget are old and weird. Every year the congress and executive branch decide on budgeting for personnel, logistics, operational programs and infrastructure – they decide to continue the same or increase it with a slight change. When the management of the organization, the budget and congress organization agrees with the operational plans, then they will be licensed and funded. It is difficult to compete for the new budget, but basically the competition between the initiatives takes place, not between the new plans and the fixed plans.

One of the hallmarks of CIA operations is the development of creativity. Creative leaders and officers will identify problems and provide solutions, But spending too much on new creativity, regardless of cutting or cutting out budgets. The “stirring up” of something in the database is hard and frustrating. But when all US intelligence facilities are under investigation and new threats, they must be shuffled.

Spying, human gathering and other programs will never be fully realized. Because of this is the nature of the world of information. The only thing they guarantee is that their performance in the context of informing policymakers and military and operational commanders emphasizes the quality, accuracy and utilization of the best available technical and human-coordinated programs.

For this, it would seem that in the world it would be better to look at methods of cyber defense, by which they can threaten malicious actors to credible counter-responses and their benefits in actions that function and integrate. The reduced information systems and sensitive networks, both for national security and for social and economic performance.

Sajad Abedi
Sajad Abedi
National Security and Defense Think Tank


Taiwan 2024 Election: Militarization or Development

Taiwan’s presidential elections will be held on January 13,...

The Political Dynamics Between the Establishment and Anti-establishment

Many of those who closely monitor the presidential election...

Ukraine’s new ‘enemy’ – war fatigue in the West

America has become one of Ukraine’s greatest worries. Its...

Why West fears Trump’s return but the rest of the world does not

Western liberals are having nightmares about Donald Trump, notes...