• Home
  • security requirement
    • List of Articles security requirement

      • Open Access Article

        1 - Identifying the common threats and vulnerabilities in the Internet of Things (IoT) and offering security policies for confronting them
        safiyeh tahmasebi limooni Shahrzad Ghasemi Roghayeh Ghorbanloo
        Objective: the objective of this research is to identify the common threats and vulnerabilities in IoT and offering security policies to cope with them. Methods: the methodology of this research is applied based on its objective, and descriptive-surveying based on data More
        Objective: the objective of this research is to identify the common threats and vulnerabilities in IoT and offering security policies to cope with them. Methods: the methodology of this research is applied based on its objective, and descriptive-surveying based on data collection. The statistical population includes all exerts and professors of IoT in universities of Tehran with 50 members. The sampling method was convenience non-random. The sample volume detected was similar to the statistical population. The research tool was the researcher-made questionnaire from the systematic study of thematic literature. The validity of the questionnaires was obtained by referring to the experts of the IoT field. The reliability of the tool was 0.88 using Cronbach’s alpha coefficient for the questionnaire. Data was analyzed using descriptive and inferential statistics by SPSS software. Results: Although various standards have been developed in the field of security and confidentiality in IoT, the security needs of IoT and even its risks have not been still identified and analyzed. In addition, it needs confidentiality mechanisms, accuracy, authentication, and access control precisely. According to the findings of the tests of this research, vulnerabilities can be classified and cited in 21 groups. Conclusion: the results of tests show that various experts based on their landscapes and activity fields determined a varied set of security policies to cope with Internet threats in the IoT field. However, the most important security policies against the security threats in IoT include mutual and efficient authentication, access control, secure architecture configuration, encryption of communications and data, chronology, and monitoring by concluding the provided ideas. Manuscript profile
      • Open Access Article

        2 - Foreign policy strategy of Mohammed bin Salman and its security requirements for Iran
        Omid Azizyan Hossein Rafie Ali Akbar Jafari
        After entering the power system in Saudi Arabia, Mohammed bin Salman, made great changes to the Saudi foreign policy strategy. By leaving the traditional strategy of defensive policy, he conducts an offensive strategy against Iran and the middle east and north Africa re More
        After entering the power system in Saudi Arabia, Mohammed bin Salman, made great changes to the Saudi foreign policy strategy. By leaving the traditional strategy of defensive policy, he conducts an offensive strategy against Iran and the middle east and north Africa regions. Meanwhile, changing the coalition patterns in the region in the form of alliance with Israel, the NATO plan and trying to retain American military in the region has threatened national security of the Islamic Republic of Iran. However, the present study aims to answer the question of what requirements the foreign policy strategy of Mohammad bin Salman in the region has created for the foreign policy and national security of the Islamic Republic of Iran? In this paper, "the security of the Copenhagen school" and "aggressive constructivism" have been used as a theoretical framework. Research methodology and data collecting are descriptive-analytical and library-documentary approaches. The findings indicate that the increasing closeness of Saudi to Israel, trying to create an Arab front along with Egypt and the United Arab Emirates, Riyadh 's attempt to move closer to the United States and bring this country to a wide contrast with Iran, has touched Iran 's national security at two levels of confrontation and detente. Manuscript profile