Document Type : Special

Authors

1 secretary of Cyberspace Workgroup of Institute of Social harm Islamic Studies-Associate Professor of almostafaa univercity-pruduct expert system bagherololum(A) Institute manager

2 Assistant Professor, Department of Public Business Management, Shahed University, Tehran, Iran

Abstract

Currently, the process of defensive operations to neutralize the harm of a pest in cyberspace, in the public layer in the form of damage detection manually and not by machine and with a faithful and revolutionary mind and not ijtihad and based on verses and hadiths in a non-linear way and Neither online and then generating a post or comment based on a damage-appropriate scenario is done in an individual or island organization, neither systematically one-dimensional nor hybrid, and at the governmental level we have almost no vulgar reaction. In the method of dealing with cyberspace damage in terms of method, any method that has one of the characteristics of 1- machine as much as possible and manual action as necessary 2- hybrid operation 3- systematic activity 4- online operation 4- ijtihad and not mind believerly 5- Using the capacity of verses and narrations 6- With the support package in accordance with the designed scenario 6- Relying on the cyber army, is not doomed, is doomed to failure and can not be assessed as the religious government is exposed to cyberspace and From this point of view, facing cyberspace according to the above conditions and step by step, is quite possible and desirable.

Keywords