The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe goal of this research is to better understand the physical features of starburst galaxies. Radio and X-ray observations are good for exploring the stuff within the central regions of galaxies. A galaxy that is undergoing a strong star formation, usually in its central area, is known as a starburst galaxy. This paper provides the results of a statistical analysis of a sample of starburst galaxies. The data used in this research have been collected from NASA Extragalactic Database (NED), and HYPERLEDA. Those data have been used to examine possible luminosity correlations of X-ray to a radio of a sample of starburst galaxies. In this research, statistical software, known as statistic-win-program, has been used to inves
... Show MoreThis research aims to identify the nutritional status of the individual's relationship to malnutrition using anthropometric measurements such as weight, height and impact on the values ??of the blood study sample included 200 male and 200 female of the inhabitants of the cities of Baghdad and Baquba reviewers Central Mahtbrat
Aim: This abstract aims to highlight the critical nature of climate change as a pressing challenge facing humanity in the 21st century. It underscores the severe consequences it poses to essential facets of human existence, including water and energy resources, agricultural production, and the broader environmental systems. Method: The abstract primarily utilizes a descriptive approach to emphasize the impact of climate change on the Middle East, particularly the Arab region. It relies on a review of existing knowledge and data related to climate change and its effects on ecosystems and drought patterns. Results: The abstract outlines the direct and indirect repercussions of climate change on human life and the environment. It draws atten
... Show MoreThe importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply, It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .
Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
While the impact of the fourth Industrial Revolution on the economy keeps accelerating, the signs of the fifth industrial revolution, whose key is innovation and creativity started to evolve. However, the challenge of achieving sustainable development and its goals remains faced by the global organizations; In this situation, Islamic banks are exposed to many challenges among which is the challenge of keeping themselves abreast of the latest developments in the modern technology which in turn is a tool for continuity and competition. On the flip side, to avoid the negative impact that these changes can have such as an increased gap between financial innovations and the requirements of sustainable development. Islamic banks in the
... Show MoreThis research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r
... Show More