News

Data leakage, the main cause of cyber attacks on the country in the last two years

Sardar Mohammad Reza Farjipour, the deputy commander of the country’s cyber defense base, at the conference “Cyber ​​Defense and Immunization Measures from a Strategic and Technical Perspective” mentioned information about the state of cyber security in the country and pointed out that “data leakage” and “data theft” The method of most cyber attacks against the country has been in the past two years, he stated solutions to deal with this issue.

According to him, one way to “prevent data leakage and the aforementioned problems is to consider the issue of organizational access to sensitive data by employees on devices.” According to Sardar Farjipour, observing and following up the activities and behavior of the employees of the organizations with the data is another way to protect the data.

Cyber ​​attacks against the country using artificial intelligence

Gholamreza Jalali, the head of the Passive Defense Organization, also pointed out the role of artificial intelligence in carrying out these attacks while explaining the cyber attacks that have taken place in the country, and stating that 15% of these attacks were through artificial intelligence, he said:

“Cyberspace developments based on artificial intelligence have been developed, and on the other hand, artificial intelligence capabilities have been used in some of the threats against us.”

Jalali also called Iran the biggest source of cyber war and explained: “Iran was the biggest source of cyber war in the world last year and various models of cyber war happened against us. In the mentioned period, due to the ability of new technologies to combine them with each other, we witnessed a hybrid war centered on cyber war against our country. This combined war took place in the field of media, social networks and attack on various infrastructures of the country.

According to the head of the non-operational defense organization, the organization’s analyzes of incidents and cyber attacks last year show that these attacks are in the areas of common, current and well-known vulnerabilities in the public service sector, hidden vulnerability holes, and hardware and software implantable tools. It has been in the technological sectors of the country.

Security is the solution that Jalali suggests to face these problems: “Implementing the security program is to prevent simple and preventable damages and attacks. We have prepared a plan titled “Emergency Security” and have chosen Razavi Khorasan, which has a history of cyber attacks, along with East Azarbaijan province as an example of implementing this plan, and we have made the initial preparations for the implementation of the plan in these two places.

Using artificial intelligence to deal with these attacks is another solution that Jalali points out: “We plan to update all existing systems to use artificial intelligence. In the first step, we will implement all measures in the field of identification, security and security assessment based on artificial intelligence until the end of this year.”

Half of the cyber attacks in the world are done with artificial intelligence

Hadi Karimi Nisiani, the technical deputy of the country’s cyber defense headquarters, called the amount of attacks carried out in the world using artificial intelligence as 50% and said: “World studies in 2021, half of the cyber attacks were based on artificial intelligence.”

According to him, “Cyber ​​attacks based on artificial intelligence are modern cyber threats that follow a unique method of attack for each user, system and network, and basically the same structure of anti-viruses is not effective to deal with them.”

Therefore, according to the technical deputy of the cyber defense headquarters, despite the existence of artificial intelligence, it is no longer possible to ensure the security of network infrastructures by relying on the type of architecture of communication networks or conventional anti-viruses and anti-malwares.

All of these conditions have made the country’s non-operating defense organization include the use of artificial intelligence and the capabilities of this new technology in its plans. In this regard, Karimi said: “This year, the non-operating defense organization has put the use of artificial intelligence in dealing with cyber threats on its serious agenda.”

The need to pay attention to soft and content threats in cyber space

Reza Taghipour Anuri, the representative of the people of Tehran in the parliament, was also present at this conference and in his speech, he pointed out another aspect of cyber security: “When we talk about cyber security, we must include hard and semi-hard threats that attack the infrastructure sector. It allows to pay attention to soft and content threats as well.”

He called the cyberspace as a factor and indicator of national power and said: “If we do not pay attention to national power and national sovereignty in cyberspace, we will see that we have created the infrastructure of cyberspace with the appropriate bandwidth and have easily provided it to the enemies.” Therefore, Taghipour believes that just as the real space needs law, the virtual space of the country should also be legalized.

Taghipour, who was previously the Minister of Communications in Ahmadinejad’s government, considered the successful governance in cyber space to be the implementation of the appropriate legislative cycle, the regulation of regulations, the correct implementation of laws, the monitoring and evaluation of activities in cyber space, and the research and development of the cyber space governance model.

This member of parliament also mentioned the plans and programs that were considered in the past years for the launch of the National Information Network and said: “In 2009, we defined the National Information Network as the infrastructure of the cyber space in the fifth development plan, but eight years of this “The project was delayed and there was no progress.”

He considered the existence of the National Information Network as necessary and explained its importance, saying: “If a communication network is not secure, the loss caused to the people or the operating organization due to a one-week outage of this network may be equivalent to all the advantages gained during the period of its establishment. It should be the same network.


Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker