The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis research aims to analyze and evaluate the reality of the total quality management for the central laboratories by comparing systems of work in the laboratories of Al- Kadhimiya Didactic Hospital with the requirements of ISO 17025 to determine the degree of compatibility and the willingness to adapt to the requirements of the above specification and to show the ability of building an applicable quality management system and to identify problems and their mitigations and prevention to increase.
This study gains its importance from the importance of the labs which stems from the fact that the process of health is a set of interrelated activities, Medical examinations and tests con
... Show MoreObjective: To measure the serum levels of Fetuin-A, ischemia-modified albumin (IMA), and ferritin in hospitalized patients with severe COVID-19in Baghdad, Iraq. Moreover, to determine these biomarkers' cut-off valuesthat differentiate between severely ill patients and control subjects. Methods: This case-control study was done from 15 September to the end of December 2021 and involved a review of the files and collectionof blood samples from patients (n=45, group1) hospitalized in COVID-19 treatment centersbecause of severe symptoms compared tohealthy subjects as controls (n=44, group2). Results: Fetuin-A serum levels were not statistically different between patients and controls. In contrast, IMA and ferritin levels were significan
... Show MoreThis study dealt with the management strategy as an independent variable and the integrated industrial distribution as a variable. The study aimed at finding the integrated industrial distribution that fits with the management strategy in providing the needs of the firm on the one hand and reducing the cost of management that is reflected in increasing its profits.
The researcher selected the data from (130) decision makers in the corporation and used the questionnaire as a tool for collecting data and used a set of statistical tools and tools suitable for the nature of information and were processed using the data analysis system (SPSS version 24) Based on the analysis of the responses of the sample and the test of correlation and
The improvement of the mechanical soil characteristics of jet grouting technique is very attractive. The jet grouted soil cement columns in soft is a complicated issue because it depends on a number of factors such as, soil nature, mixture, influence among soil and grouting materials, jetting force of nozzle, jet grouting and water flow rate, rotation and lifting speed. This paper discusses the estimation of shear strength parameters of soil-cement column (soilcrete) in soft clayey soil based on the relationships between the unconfined compressive and split tensile strength for the soilcrete and the effect of the jet grouting and water pressure in the values of cohesion and internal f
The present study addressed "Performance Appraisal of Human Resource Management and Its Effect on Achieving the Organizational Success", for the topics of performance appraisal of human resource management and the organizational success gained an increasing interest being relatively important and modern topics which had a great effect on the future of organizations.
The study aimed at revealing the pattern of appraising the performance of human resource management for the study sample, and whether it was qualified to lead the ministry towards the organizational success, for this purpose two main hypotheses were formulated: 1) there is a positive significant correlation between both variables: performanc
... Show MoreThe aim of the research is to identify both the re-engineering of management processes and the strategic decision-making process in the research community and determine the nature of the correlation between the two variables and know the relationship between them to achieve the research goal. The researcher used a descriptive and analytical method. The research community consists of a group of professors and staff of the College of Education affiliated to the University of Mustansiriya in Baghdad, which their number were (45), the researcher has distributed the forms to all members of the sample, only (3) forms were excluded for invalidity and thus the number of forms approved in the analysis were (42) forms. The rese
... Show MoreBackground: Appreciation of the crucial role of risk factors in the development of coronary artery disease (CAD) is one of the most significant advances in the understanding of this important disease. Extensive epidemiological research has established cigarette smoking, diabetes, hyperlipidemia, and hypertension as independent risk factors for CADObjective: To determine the prevalence of the 4 conventional risk factors(cigarette smoking, diabetes, hyperlipidemia, and hypertension) among patients with CAD and to determine the correlation of Thrombolysis in Myocardial Infarction (TIMI) risk score with the extent of coronary artery disease (CAD) in patients with unstable angina /non ST elevation myocardial infarction (UA/NSTEMI).Methods: We
... Show MoreThe present work includes a design and characteristics study of a controlling the wavelength of high power diode laser by thermoelectric cooler [TEC] . The work includes the operation of the [TEC] to control the temperature of the diode laser between ( 0- +30) °C by changing the resistance of thermistor. We can control a limited temperature of a diode laser by changing the phase cooling between hot and cold faces of the diode, this process can be attempted by comparator type [LM –311] .The theoretical results give a model for controlling the temperature with, the suitable wavelength.