The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Transportability refers to the ease with which people, goods, or services may be transferred. When transportability is high, distance becomes less of a limitation for activities. Transportation networks are frequently represented by a set of locations and a set of links that indicate the connections between those places which is usually called network topology. Hence, each transmission network has a unique topology that distinguishes its structure. The most essential components of such a framework are the network architecture and the connection level. This research aims to demonstrate the efficiency of the road network in the Al-Karrada area which is located in the Baghdad city. The analysis based on a quantitative evaluation using graph th
... Show MoreThe current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,
... Show MoreConstructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distribution along
... Show MoreConstructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distri
... Show MoreBackground: The treatment of high anal fistulae needs to meet a balance of cure and continence. There are many surgical treatment options available for high fistula-in-ano. The best surgical operation for high anal fistulas is difficult to define because they have varying cure and incontinence rates. A loose Seton is a loop of flexible material (silastic tube, silk, and nylon) placed through the fistulous track to allow drainage by keeping the external skin opening patent. Some surgeons use the loose Seton to allow drainage and others believe that it promotes healing by inducing fibrosis
Objective: To check the efficacy of loose Seton in the management of high anal fistulas.
Patient and method: A prospectiv
Human resources constitute the most important recourses that the organization owned today, as it may have developed financial and technology resources to achieve their goals, but they are not able to use it with required efficiency and effective and quality desired unless there is human resources that have good skills, experiences and talents that able to directing and exploited ideally that compatible with market requirements, where today's market and business organizations which compete naturally inherent talent, so the task is to attracting and developing talented resources and preservation these talented resources from the challenges that facing organizations.
The research seek to achieve
... Show MoreThe objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr
... Show MoreBackground: Infertility is a relatively common condition. It can be attributed to factors in a female partner, a male partner, or in both partners. However, certain socio-demographic and life style factors have been linked to female infertility.
Objective: To determine the association between female infertility and selected risk factors.
|
Patients and Methods: This is a case
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show More