Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreParasitic diseases can affect infection with COVID-19 obviously, as protective agents, or by reducing severity of this viral infection. This current review mentions the common symptoms between human parasites and symptoms of COVID-19, and explains the mechanism actions of parasites, which may prevent or reduce severity of this viral infection. Pre-existing parasitic infections provide prohibition against pathogenicity of COVID-19, by altering the balance of gut microbiota that can vary the immune response to this virus infection.
The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreIn this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreThe impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show MoreObjective: The present study aims at identifying the dimensions behind juvenile delinquency, and to identify their
socio-demographic characteristics of gender, age, and type of delinquency.
Methodology: A descriptive study was conducted in correctional schools in Baghdad City to identify the
behavioral, psychological, and social dimensions contributed to juvenile delinquency. The study sample consisted
of (50) juvenile delinquents, of them, 27 males, and 23 females whose ages range from (12 - 20) years. Those
delinquents live in males’ correctional school in Al-Shalichia, and females’ correctional school in Al-Karradah, in
Baghdad City. The study sample was selected in purposively. The study questionnaire was design