The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreBackground: The grading systems of salivary mucoepidermoid carcinoma depend on different histologic and morphologic features. The aim of this study was to compare between Auclair and Brandwein systems according to their histologic criteria, and the type of cell predominant. Materials and Methods: Twenty-one case included hematoxylin-eosin (H&E) stained tissue slides that were diagnosed as MEC, originally categorized into low and high grade type regardless of the grading system, have meticulously undergone histopathologic review. The sample was graded according to criteria owing to Auclair and Brandwein methods. The predominant type of cells was determined by microscopic examination according to grade of tumor. Results: Regarding the
... Show MoreThis study is concerned with organizational learning and its impact on total quality management in the education sector. Organizational learning is a process that provides the educational sector with the ability to adapt and respond rapidly to developments and changes in a better way according to its main dimensions (Mental Models, Personal Mastery, Team Learning, Shared Vision, System Thinking) by adopting the philosophy of Total Quality Management (TQM) in accordance with its basic dimensions (leadership, customer satisfaction, participation of workers, continuous improvement, training and education). The main purpose of this study is to know (the impact of the Senge model of organizational learni
... Show MoreThis study is concerned with organizational learning and its impact on total quality management in the education sector. Organizational learning is a process that provides the educational sector with the ability to adapt and respond rapidly to developments and changes in a better way according to its main dimensions (Mental Models, Personal Mastery, Team Learning, Shared Vision, System Thinking) by adopting the philosophy of Total Quality Management (TQM) in accordance with its basic dimensions (leadership, customer satisfaction, participation of workers, continuous improvement, training and education). The main purpose of this study is to know (the impact of the Senge model of organizational learni
... Show MoreThe economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreActual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42) administrative leaders in the investigated organization and adopte
... Show More