Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Study the Effect of the High Voltage on The preparation of Polyvinyl Alcohol/ Tio2 Nano Fiber by Electrospinning
...Show More Authors

Abstract:In this research we prepared nanofibers by electrospinning from poly (Vinyl Alcohol) / TiO2. The spectrum of the solution (Emission) was studied at 772 nm. Several process parameter were Investigated as concentration of PVA, the effect of distance from nozzle tip to the grounded collector (gap distance), and final the effect of high voltage. We find the optimum condition to prepare a narrow nanofibers is at concentration of PVA 16gm, the fiber has 20nm diameter.

Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Study the Effect of the High Voltage on The preparation of Polyvinyl Alcohol/ Tio2 Nano Fiber by Electrospinning
...Show More Authors

In this research we prepared nanofibers by electrospinning
from poly (Vinyl Alcohol) / TiO2. The spectrum of the solution
(Emission) was studied at 772 nm. Several process parameter were
Investigated as concentration of PVA, the effect of distance from
nozzle tip to the grounded collector (gap distance), and final the
effect of high voltage. We find the optimum condition to prepare a
narrow nanofibers is at concentration of PVA 16gm, the fiber has
20nm diameter

View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Biological Macromolecules
A novel designed nanofibrous mat based on hydroxypropyl methyl cellulose incorporating mango peel extract for potential use in wound care system
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Jan 21 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Environmental parameters drive the phytoplankton community structure: a case study in Baghdad Tourist Island Lake, Iraq
...Show More Authors

Phytoplankton community is a model for of monitoring  aquatic systems and interpreting the environmental change in aquatic systems. The present study aimed to forecast environmental parameters that drive the change of phytoplankton community structure in the lake. The present study was carried out in Baghdad Tourist Island Lake (BTIL) for the period From October 2021 to May 2022. The study included the quality and quantity of phytoplankton, moreover, the highest and lowest value of the physical and chemical parameters were (Water temperature (13-30 °C), Light penetration (94-275cm), electric conductivity (837-1128 µS/cm), salinity (0.5-0.7 ‰), pH (7-8.2), total alkalinity (126-226 mg CaCO3/L), total Hardness (297-395 mg CaCO3/L

... Show More
Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Effect of Dam Height on The Stability of Earth Dam (Case Study: Karolinka Dam)
...Show More Authors

The Karolinka earth-fill dam was constructed between 1977 and 1984 on the Stanovnice river above the town of Karolinka in the region of Vsetínsko in Czech Republic. Because of leakage on the downstream dam face due to technological indiscipline when filling dam layers during the dam construction stage, there were some steps to improve state dam safety. The final rehabilitation is to construct the diaphragm walls from self-hardening cement-bentonite suspension along the length of the dam. In addition to connecting the gallery and abutment (2 × 25 m long) by using jet piles. The article presents numerical modeling of safety factor evaluation associated with the state of the dam body and foundation; before, and after seal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Openness and the Degree of Impact on Engagement Learner Department of Architecture Case Study
...Show More Authors

        This paper concerns with openness concept in contemporary learning environment, which ranges from physical characters to its relation with learning efficiency and its output. Previous literatures differ to clear the effect of openness on the engagement between learner within themselves, and with this kind of spaces. Engagement means: active participation, the ability of making dialogue, self-reflection and the ability to explore and communicate with them and
within learning space. Research roblem was: The lack of knowledge about the effect of Openness on learner engagement with learning spaces. The two concepts were applied on three types of learning spaces in the Department of the Architectu

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Ability of the Independent Auditor to Audit the Application Requirements of Electronic Commerce
...Show More Authors

The purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.

The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref