Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreIraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreDocument analysis of images snapped by camera is a growing challenge. These photos are often poor-quality compound images, composed of various objects and text; this makes automatic analysis complicated. OCR is one of the image processing techniques which is used to perform automatic identification of texts. Existing image processing techniques need to manage many parameters in order to clearly recognize the text in such pictures. Segmentation is regarded one of these essential parameters. This paper discusses the accuracy of segmentation process and its effect over the recognition process. According to the proposed method, the images were firstly filtered using the wiener filter then the active contour algorithm could b
... Show MoreThe research dealt with a study of economic diversification indicators in Iraq and an indication of the extent to which economic diversification events are desirable in its sectors because desirable diversification events are truly the best means of targeting a fair distribution of income. The research included studying the experiences of selected countries for Norway and Chile, and studying economic indicators and policies for each of them in order to benefit From these two experiences, the research has concluded that the Iraqi economy suffers from a large concentration of the oil sector, which made the Iraqi economy unilateral in which oil represents 90% according to the Herfindel-Hirschman Index, either for Norway and Chile, i
... Show MoreThe purpose of this study is to investigate the effect of credit risk indicators on the Arab Gulf countries' banks Profitability over the period of 2015 to 2017. The banking credit risk was calculated using non-performing loans ratio affecting banks profitability indicators like net income and by using fixed effect and random effect model analyses, the study found that increasing in non-performing loans ratio will decrease the net income in gulf banks, the study also found that personal loans represent the largest share of loans granted in gulf banks. Also, the study recommends the importance of developing the capabilities of credit departments in commercial banks in dealing with bad loans, and studying the financial statem
... Show Moreيحتل موضوع الاستهلاك اهمية كبيرة في الدراسات الاقتصادية في حالتي السلم والحرب وذلك لارتباط هذا الموضوع بالانسان والمجتمع ولكونه احد مؤشرات مستوى الرفاهية الاقتصادية والاجتماعية وتزداد اهمية ضبط حركة هذا المتغير السلوكي والكمي في زمن الحرب اكثر مما هو عليه في حالة السلم، في هذا البحث تم استخدام بيانات احصائية عن الانفاق الاستهلاكي الخاص ونصيب الفرد من الدخل القومي اضافة الى الرقم القياسي لاسعار المس
... Show More