As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Abstract
The logistic regression model is one of the nonlinear models that aims at obtaining highly efficient capabilities, It also the researcher an idea of the effect of the explanatory variable on the binary response variable. &nb
... Show MoreThe experiment was conducted to study the effect of sodium chloride (NaCl) at the concentrations of 0.0, 0.5, 1.0 and 1.5% on the callus cells. The Iraq wheat variety was grown in vitro for the purpose of knowing the effect of salt stress on some indicators and cellular components of callus by using a randomized complete design, at the laboratories of tissue culture propagation date palm unit in the College of Agriculture / University of Kufa during the period 2014-2015. Fresh and dry weight, the rate of absolute growth, percentage of dry matter of callus, content of the callus cells of proline, total soluble carbohydrates, sodium and potassium ions, effectiveness of the enzymes catalase and peroxidase study shock salt proteins in callus we
... Show MoreIt aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat
... Show MoreThe present study attempts to identify some of the differences between the skull bones of two species Cyprinus carpio and Carassius carassius, which belong to the Cyprinidae family. The study is a taxonomic diagnostic study between the two species which are considered local fish abundant in the Iraqi aquatic environment
The aim of this study is to evaluate oxidative stress in diabetes mellitus (DM) Type1 by the measurement of Glucose-6-phosphate Dehydrogenase (G-6-PD), an enzyme expressed in human RBCs, is important in the generation of reduced glutathione which is the key product in oxidative stress controls. The Study was carried on 80 samples of blood and serum of National Diabetes Center (NDC). The study groups under fasting conditions and they divided as:20 samples of diabetes mellitus patients without complications and 20 samples of diabetes mellitus with cardiovascular (CV) complications and 20 samples of diabetes mellitus with Nephropathy (Neph) complications compared with 20 control group with average age (13-67) years.. The results sh
... Show MoreIn this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and
... Show MoreThis research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the BL technique, and the second control group (25) students have been taught in the traditional method.
Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend
... Show MoreIn this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
The present paper is devoted to studying the imitation of some Quran phrases and words in the tale of "The Leprous Girl". The paper aims at identifying the common ground between the tale and some great stories related in the verses of the holy Quran, and comparing the original work with the present translation. First, we translated the tale from Russian into Arabic so as to be tackled in study, and then an identification of the commonalities between this tale and the Quran wording is made. It was found that texting is clear in the original text of the tale, hence the need for this paper. By studying the texts and phrases employed by the writer, we observe that the text is influenced by the Quranic stories whose effects have been reflecte
... Show More