Journal of Cyber Security and Risk Auditing

Volume 2025, Issue 2 - Table of Contents

Unveiling the Causes of Fatal Road Accidents in Iraq: An Association Rule Mining Approach Using the Apriori Algorithm

By Malath Riyadh Alboalebrah, Salam Al-augby

PDF logoPDF

Abstract

With the increase in fatal accidents in Iraq, they have become a source of concern for both authorities and the public. Therefore, it has become necessary to conduct an analysis of these road accidents. This study aims to provide recommendations to responsible authorities after assessing the frequency of fatal traffic accidents and identifying the most common causes. This will provide actionable insights for decision-makers to formulate laws that allow for the reduction of these accidents and the reduction of human and economic losses. This paper applied data mining algorithms to three years of traffic fatal accident data in Iraq, excluding the Kurdistan Region. The results showed that people without driver's licenses and with primary school certificates were more likely to fail to wear seatbelts, making them a dangerous group. Married individuals aged 36-41 were also associated with fatal accidents. Based on the results, some recommendations were made to reduce these accidents.

Analyzing Cybersecurity Risks and Threats in IT Infrastructure based on NIST Framework

By Osama Aljumaiah, Weiwei Jiang, Santosh Reddy Addula, Mohammed Amin Almaiah

PDF logoPDF

Abstract

Due to the increasing frequency and complexity of cyberattacks in recent years, cybersecurity management has received significant attention, particularly concerning the critical infrastructure of targeted countries. Such infrastructure contains several vulnerabilities that may be readily exploited if not adequately managed. National cybersecurity regulators require critical infrastructure organizations to regularly monitor and report their cybersecurity activities. This study assesses whether the NIST framework can effectively address most threats facing critical infrastructure and identifies any notable gaps within the framework. In this literature review, most threats reported in critical infrastructure will be discussed and mapped according to the NIST cybersecurity functions, concluding with a discussion of the findings. The findings indicates that human vulnerabilities with (12 instances) represent one of the leading threats to critical infrastructure, appearing prominently in reviewed sources. Human errors, negligence, lack of awareness, insufficient training, and susceptibility to social engineering significantly increase the risk of successful cyberattacks.

Classification of threats and countermeasures of cloud computing

By Rasha Almanasir, Deyaa Al-solomon, Saif Indrawes, Mohammed Almaiah, Umar Islam, Marwan Alshar'e

PDF logoPDF

Abstract

This article focuses on the study of cloud computing, it’s various models, and cloud service types such as SaaS, PaaS, and IaaS. It emphasizes the security challenges and cyber threats associated with cloud environments, while also proposing methods and solutions to protect these systems. The study underlines the advantages of cloud computing in offering rapid, cost-effective access to technology and services, but also points out the vulnerabilities of multi-tenant architectures and the need for robust security measures to address these risks. Additionally, the article presents a detailed analysis of major security threats such as data loss, forgery, man-in-the-middle attacks, and denial of service (DoS) attacks—and explores detection and prevention techniques. These include the use of advanced tools for threat monitoring and pattern analysis, aimed at strengthening security and boosting user trust in cloud computing systems.

Secure IoT-Based Real-Time Water Level Monitoring System Using ESP32 for Critical Infrastructure

By Mahmood A. Al-Shareeda, Ahmed Mohammed Ali, Mustafa Adel Hammoud, Zaid Haider Muhammad Kazem, Muslim Aqeel Hussein

PDF logoPDF

Abstract

Many sectors rely on accurate tank levels, including those dealing with water management, farming, and industry. For effective use, overflow prevention, planning, and resource management, accurate water level measurement is essential. One of the main goals of this research is to find a way to use high- tech sensors to determine how much water is in a tank. In order to gauge how long it takes for sound waves to travel from the water’s surface to return to the sensor, the suggested system makes use of ultrasonic sensors. The technology determines the precise measurement of the water level by analyzing the reflected waves, which in turn determine the distance between the sensor and the water level. We will construct a prototype and test it in a controlled laboratory setting to ensure the system works as intended. An ESP32 microcontroller, an ultrasonic sensor, and a display device showing the water level in real-time will make up the prototype. This study is important because it has the ability to improve water management methods and encourage the efficient use of resources. In order to maximize efficiency, minimize waste, and guarantee sustainable practices, enterprises rely on precise water level assessments. In addition, the system can help find problems with the tank quickly, so maintenance can be done when it’s needed and accidents can be avoided.