Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreThe tracking of satellites motion and their path around the earth is important things in the mechanical of satellites motion. Significant parameters for the determination of time entrance and existence of the satellite could be obtained from the shadow of the earth. In the present work the tracking and time determination for entry and exit from earth shadow have been studied. In the present work we built a software for tracking the motion of satellites in orbit around the earth and determine the change of both distance and speed as a function of time. The perturbations effect on the satellite has been neglected from the earth atmosphere drag and the earth gravity and other effects. The equation for calculating the shadow is solved using num
... Show MoreThe aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.
The paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
This research deals with the aesthetics of describing nature and the joys of urban life in the environment of Fatimid Egypt, among a group of poets, who were deceived by its enchanting beauty and breathtaking scenery, through it they depicted the reality of the life they live, and the things that involved them, as well as showing their personal culture, and the joys of life that experience, articulating this with a descriptive and analytical study, focusing on how the poet portrayed the visual scene, in an important stage of Arabic literature in Egypt.
The Sebkha of geomorphological aspects of evaporative where climate leads active role, which forms part of the earth's surface in the form of Iraqi Mesopotamia plain who of the most fertile land, and because of natural factors and human Common turned most of the arable land to the territory of Sebkha. It was to determine the exact geomorphological associated of Sebkha formats by field work such as: Alnbaka, lakes, salt flats, and other forms of Small is: bridges salt, mud cracks, salt ponds, Rectangles and polygons salt, Sahaf salt, salt domes, salt gravel, bumps saline (salt points), Ash salt, salt bows, in detail and accurately documented Terrestrial Photogrammetry field and were compared to the levels and standards varieties have been
... Show MoreThe genic variation analysis of Pseudomonas aeruginosa after filtering the spurious variation appeared that 222 variable loci out of 5572 loci were detected. The type of variation analysis revealed that single nucleotide polymorphism was highly significant compared with other types of variation due the fact that the genome variation was achieved on the level of microevolution. Moreover, the proportional effect of functional scheme showed that genes responsible for environmental information were the highest comparable to another scheme. The genes of environmental information processing locate on outer membrane and face the defense strategy of the host therefore change in proteins coded by these genes lead to escape the immune system defense
... Show MoreMR Younus, Nasaq Journal, 2022