The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
The present analysis targets to recognize the influence of the separate teaching approach on the accomplishment of grammar for scholars of the College of Islamic Sciences. The target of attaining this target led the investigations developing the subsequent null theories: 1. No statistically substantial variance is happened at the consequence level of 0.05 between the mean scores of the scholars in the investigational category who learnt consistent with the separate learning approach and the mean scores of the scholars in the control category who learnt in the conventional method in the accomplishment test. 2. No statistically substantial variance has been observed at the consequence level of 0.05 in the mean differences between the
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIntroduction: An aneurysmal bone cyst are enigmatic lesionof unknown cause and presentation and are difficult todistinguish from other lesions, it is a benign, but expansibletumor like lesion that generally occurs in the long bones. Ananeurysmal bone cyst arising from the flat bone like clavicleis rare .Case presentation: We report a 12-year-old girl child with ananeurysmal bone cyst of the lateral third of left clavicletreated with enblock resection. The pathologic findingsconfirmed the diagnosis of aneurysmal bone cyst. Thepatient has been followed up for one year with no evidenceof recurrence .Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
Introduction: An aneurysmal bone cyst are enigmatic lesion of unknown cause and presentation and are difficult to distinguish from other lesions, it is a benign, but expansible tumor like lesion that generally occurs in the long bones. An aneurysmal bone cyst arising from the flat bone like clavicle is rare . Case presentation: We report a 12-year-old girl child with an aneurysmal bone cyst of the lateral third of left clavicle treated with enblock resection. The pathologic findings confirmed the diagnosis of aneurysmal bone cyst. The patient has been followed up for one year with no evidence of recurrence . Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MoreThrough this descriptive study of the image of the Islamic Republic of Iran in the independent Iraqi press, the researcher relies on surveys, content analysis, and observation tools. The research community selected was the Iraqi independent press, represented by the Al-Zaman, Al-Dustour, and Al-Mada newspapers. The researcher adopts the comprehensive inventory method for newspaper issues produced between October 2019 and January 2020.
The results of this study show that Iran's interference in Iraq's internal affairs was one of the most prominent components of the picture that independent Iraqi newspapers seek to paint about the Islamic Republic of Iran.