Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MorePurpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.
Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.
Methodology:
Tourist business organizations face a challenging and the risks dynamic environment reflected its impact on the community and generate extra under pressure in the responsibilities and burdens of exceptional and affected much of factors, accidents and risks as a result of the actions and attitudes of disasters variety may exceed the geography of States border, which requires the absorption of risks facing the tourism and how to manage and deal with them scientific and reasonable grounds for the diagnosis and treatment of risk and how to reduce the aggravation and the different kinds.
As risks affecting the most important and vital to organizations as a tourist aspects of the market share and styles tourist
... Show MoreObjective: To find out if there are any significant differences between these women's knowledge in the
management of Breast Self-Examination in study and control group regarding some variables.
Methodology: A quasi-experimental design was used. A purposive "non-probability" sample of (260) women who
are employee and students in both colleges (Nursing and Health and Medical Technologies) was selected. The
sample consists of two groups, experimental group (130) includes those in (Nursing college), and control group
(130) in (Health and Medical Technologies). A questionnaire was constructed which included demographic
information, reproductive information, family history, previous medical history, and information about wome
Visible-light photodetectors constructed Fe2O3 were manufactured effectively concluded chemical precipitation technique, films deposited on glass substrate and Si wafer below diverse dopant (0,2,4,6)% of Cl, enhancement in intensity with X-ray diffraction analysis was showed through favored orientation along the (110) plane, the optical measurement presented direct allowed with reduced band gap energies thru variation doping ratio , current–voltage characteristics Fe2O3 /p-Si heterojunction revealed respectable correcting performance in dark, amplified by way of intensity of incident light, moreover good photodetector properties with enhancement in responsivity occurred at wavelength between 400 nm and 470 nm.