With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreFinance is an essential element when developing any housing policy because of its role in providing funds to institutions concerned with housing lending. Therefore, the research aims to evaluate the financial aid provided by the Central Bank of Iraq in solving the housing crisis through the adoption of the Central Bank of Iraq initiatives to support the financing of the housing sector, and here The importance of the research is highlighted to determine the role of the initiative by drawing an effective strategy aimed at providing the housing sector with the necessary funding. By providing financing to financial institutions directed towards providing real estate credit, and that the percentage of the contribution of the implement
... Show MoreThe main objective of this research is to identify the role of job satisfaction in influencing strategic agility through knowledge sharing. The researcher used the descriptive as well as the analytical approach in the completion of this research by collecting data by means of the questionnaire as the main tool on a sample of the General Company for Food Industries' employees, whose number reached (76) individuals. Moreover, some statistical methods were employed to process the data; including the arithmetic mean, Standard deviation, simple linear correlation coefficient (Pearson), simple linear regression, and the median variable test. It was represented that there is a significant and essential impact of job satisfaction in influen
... Show MoreThe research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreThe development of a future mechanism for sustainable development in Iraq to meet the current and future challenges requires an analysis of the indicators of sustainable development. This research aims at presenting and analyzing the social care aspect and highlighting the important role of taxes with a focus on social sustainable development to determine the extent and direction of changes. Level of progress, the researcher concludes the weakness of the financial allocations to the Ministry of Labor and Social Affairs and in line with the large number of people who apply the conditions and controls, and recommends the researcher the necessity of participation of all segments of society between the public and private sector In terms of o
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThis research deals with the formalities of the mortgage contract according to American law, We have given an overview of the provisions of this law related to the subject, We have also taken into consideration the role of American jurisprudence and the judiciary in finding legal solutions to the aforementioned formality, We have discussed the formality of mortgage in American law in two sections, In the first section we showed the formalism in immovable mortgage, and the second section specified to studying the formalism in movable mortgage.