This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the policies described in the standard (ISO / IEC 27001), has been approved (checklist) Based on the standard specifications and procedures mentioned in the standard as a main tool for collecting and analyzing data and information for a sample of private banks, and in the light of the application process a number of conclusions were reached, the most prominent of which is the failure of banks to fulfill the research sample for all the requirements and conditions of the standard (ISO / IEC) 27001. Weaknesses and imbalances in the security of the systems used to process data and information, which requires standing on them and studying them, and the researchers made a number of recommendations, the most prominent of which are on the banks ’departments. To discuss increasing interest in meeting quality requirements in relation to the security of its information by meeting the reliability requirements of information technology security contained in the standard (ISO/IEC 27001), with the need to seek external consultants and auditors specialized in the field of information security for the purpose of security checks of the systems applied in the bank..
In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show Moreيدور هذا البحث حول جمع الالفاظ التي تتعلق بعناصر الطبيعة السماويّة وظواهرها في ديوان محمد مصطفى الماحيّ, وترتيبها في حقول دَلاليّة على وفق دراسة معجمية, تناولت فيها الالفاظ التي تتعلّق بعناصر الطبيعة السماويّة وظواهرها, فكان الهدف من هذه الدراسة هو دراسة الألفاظ التي ترتبط دَلالتها بمفهوم عام يجمعها حقل دلاليّ واحد كجمع الفاظ (السماء،والقمر، والبدر، والنجم، والكوكب), تحت مفهوم (عناصر السماوية وظواهرها الطب
... Show Moreقبل ثلاثين سنة كانت المصارف الاسلامية مجرد أمنية، الا ان اعمالا بحثية جادة أجريت خلال العقود الثلاثة السابقة أظهرت أن المصارف الاسلامية قابلة للتنفيذ وتمثل طريقا ذا جدوى في الوساطة المالية، وضرورة من ضرورات العصر الحديث لا تستطيع أن تستغني عن خدماتها أمة من الامم أو قطاع من القطاعات الاقتصادية والاجتماعية والثقافية.
لذلك تم انشاء عدد من المصارف الاسلامية خلال هذه المدة في ظل وسط اقتصادي
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
يهدف هذا البحث الى بيان مفهوم محاسبة التحوط والمعاملات بالعملة الاجنبية والمشاكل الناجمة عن التعامل بها وتسليط الضوء على القواعد المحاسبية المحلية والدولية المتعلقة بمحاسبة التحوط للحد من مخاطر التقلبات في اسعار صرف العملة التي تتعرض لها الوحدات من خلال جعل الابلاغ المالي للوحدات المحلية بالتوافق مع المعايير الدولية للإبلاغ المالي ولإنجاز هذا الهدف تم اختيار عينة من الوحدات الاقتصادية الع
... Show MoreIn this work, using GPS which has best accuracy that can be established set of GCPs, also two satellite images can be used, first with high resolution QuickBird, and second has low resolution Landsat image and topographic maps with 1:100,000 and 1:250,000 scales. The implementing of these factors (GPS, two satellite images, different scales for topographic maps, and set of GCPs) can be applying. In this study, must be divided this work into two parts geometric accuracy and informative accuracy investigation. The first part is showing geometric correction for two satellite images and maps.
The second part of the results is to demonstrate the features (how the features appearance) of topographic map or pictorial map (image map), Where i
In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show More