نقوم أولا بالتحدث عن الحوسبة السحابية بصورة عامة إضافة الى المشاكل الأساسية التي تواجهها ونركز على المشاكل المتعلقة بالsecurity , ومن ثم نقوم بدراسة حالة الهجمات من النوع DOS وكيفية توظيف بعض تقنيات تنقيب المعطيات للكشف عنها والتعامل معها .
The current research aimed to recognize the level of psychological security among a
sample of Tishreen university students.
In order to achieve the objective of this research, Shkeer's psychological security scale
was applied, which its factor str
ucture was investigate by the researcher in a previous
study. The scale was used for data collection, and in year 2017-2018, a sample of (233)
students participated in the research.
The results showed that the level of students’ psychological security is medium, and there
is no difference between males and females, but there are differences according to the
specialty, especially in “practice life”, where that the students of practice specialty showed
higher feeling of psychological security than the students of theoretic specialty.
Financial security occupies an important role in achieving economic development by
finding the sources of funding and organize the mechanism of subscription on the shares
And issue it.
Damascus security exchange consider one of the best Arabic exc
hange
Securities and in spite of the current Syrian events the security maintained on good level
of performance despite the lack of the listed companies and that cause to lack of diversity
although this security experience many obstacles but it can be solved and that lead to
increasing the participation of this security in the economic development.
In this research was rely on the curriculum descriptive analytical get to know the market
financial market Damascus Securities through reports issued by the data of the securities
and concluded search to the limited role played by the market in the process of economic
development and not the variety of securities denied companies of finding the sources of
funding their investment and that all the constraints facing the market can be exceeded and
attention to the market and that would raise the economic growth rate.
This research is an attempts for studying security considering it as an phenomenon in
society, which must be focused on, and work on the application of sociological analysis
tools for research and study.Especially as security-related problems and c
oncerns become
an integral part of our lives at the individual and collective levels, which also influence the
shaping of social relations, whether through discourse or practice.Therefore, the primary
objective of the research is to gather all the data related to the general dimensions of what
we can call sociology of security; to deal with security as a basic social process, subject to
change, without which human life can become in danger.
The present research was designed to investigate the factor structure of Shkeer's
psychological security scale (2005), by using the exploratory factor analysis.
the psychological security scale of shkeer consists of four dimensions: (individual
bu
ilding and future vision (14 items), general and practice life (18 items), temperament (10
items), social relationships and social interaction (12 items).
The researcher used the descriptive method, and the research sample was chosen
randomly, while the data were collected from (415) students of Tishreen University.
The research revealed that the psychological security consists of six factors, which
had explained (52.91%) of total variance of items:
The first factor: future vision and includes 14 items.
The second factor: social relationships and includes 7 items.
The third factor: temperament and includes 7 items.
The fourth factor: practice life and includes 5 items.
The fifth factor: general life and includes 5 items.
The sixth factor: social interaction and includes 4 items.
The researcher suggests that more studies should be done to investigate the factor
structure of the psychological security scale on different Syrian samples.and proposes to
study the relationship between psychological security and some variables.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign looking for patterns in financial transactions to discover illegal activities. From this perspective it wa
s just a matter of time for the discipline to reach the important area of computer security This research presents a collection of research efforts on the use of data mining in computer security.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security prot
ocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.
The research aims to identify the correlation between learned
helplessness and psychological security، And knowledge of the
differences between the mean scores of the respondents to the
learned helplessness scale and psychological security scale
according to the variables of sex and school year.
The application of the learned helplessness scale prepared by
Hanan Aldaher and psychological security scale prepared by Fahed
Aldilim on a sample which consist from (277) of open learning
Kindergarten students in the college of education at the University
of Damascus، for the year (2016_2017).
We present in this paper a study aimed to identify actual situation of
information systems security management in The Ministry of
Communications and Technology and entities associated, and the
ways to improve it.
Device to device Communications (D2D Communications) is a new promising
technology, that is used to increase data exchanged volume, to expand the
coverage area of base stations, core network data offloading, and to move to
new frequency bands that have not been used in mobile networks before.