چکیده انگلیسی مقاله |
The scope for the concept of security in network has rooted in five political, economic, cultural, social and judicial arenas which the lack of comprehensive political package for preventive management of probable threats in cyber space could confront the underground for ideal development with serious challenges. From the other side, removing the legal, supervisory and enforcement vacuums of managing the social security threats in the web space have had a high effectiveness index that possesses six features of companion with higher level, ultra-section, macro looking, strategic, goal-centered (mental unity) and program-centered (stability of procedure) documents and every kind of surface look about cyber threats could create the formation embryo of the occurrence of quintuple crisis, legitimacy status, penetration, distribution and cooperation in macro policies. Today vital foundations in various fields of economy, industry, energy, transportation, finance, public service, society, culture, policy, military, security and intelligence have a high dependence to cyber space and many benefits from which were allotted to human, but this phenomena have created new, complex, vague and dangerous vulnerabilities, threats and challenges in all the above said fields too. Today, the presence of Police is compulsory in virtual territory to control much of the abnormalities which may form in this space. The emergence of virtual police could fulfill many of the citizen's needs which real centers are not capable to handle them. In this research through analysis and perceptive research we are going to answer questions such as: what is the most important security, disciplinary threats in cyber space? What is the role of Police in preventing crime and threat with the approach of developing soft security in cyber environment? What are the necessities, goals and missions for cyber Police to detect and prosecute the criminals in cyber space? What are the applied techniques to preserver information security against the threats of cyber space? |