عنوان مقاله [English]
نویسنده [English]چکیده [English]
Studying the role of NAJA's intelligence and security in cyber police's missions considering importance of cyber police's duties that try to carry out its power of prosecution and prevention in subject cyberspace crimes, this police following the development of very high and complex changes in field of information and communication technology need to development with mental health, preservation and credibility simultaneously. cyber police should have the necessary capabilities to create its own security, more than this, but it so happen that cyber police's staff due to easy access to information bank and countersecurity systems intentionally or unintentionally, have attracted to destructive cyber space or there is not the correct and consistent protection of cyber police's software and data, hardware, and equipment and computer places. So what is certain, cyber police in order to fundamental and comprehensive preservation against its mission's treats need to choose targeted security precautions and preparation. Therefore, study's purpose is to investigate the intelligence and security organization's role in developing of security in cyber police's missions. In this study, have been proposed four questions about the protection of (user-software-hardware-places) and also four hypotheses in relation above questions. Present study according to its goal and form the viewpoint of kind of research is applied and its method is descriptive- survey. Gathering data have been achieved with document method and distributing questionnaires with closed five choice questions Likert scale. Statistical community of this research includes 100 person from NAJA's security and intelligence organization and cyber police and after studying subject'stheoretical principles, fulfillment of questionnaires and analysis data through statistical reliable tests (Pearson coefficient) were determined that the role of NAJA's security and intelligence organization in development of security in cyber police'smissions from 5 choices very high, high, medium, low and very low has been very high and according to the results of the chi square test has achieved the highest level by first hypothesis ( protection from cyber police’s computer users). It is necessary with a view to these studies in order to development of security in cyber police’s missions consider the researcher’s suggestions in fifth chapter (examples: to compile appropriate directions, to divided computer-based jobs, to select persons, to examine security authorization, to implement optimal supervisions of software and hardware, security activities to prepare software, to consider security precautions in designing and producing, preparing and purchase, transposition and distribute, to affix hardware, standardize and establishing limit about shuttling and traffic to computer places).