As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Is the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.
The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and ma
... Show MoreThe research aims to clarify the role that psychological ownership, through its dimensions, plays in deterring the effects of toxic leadership, through its dimensions, in the Ministry of Industry and Minerals. The research started with a basic problem represented by the following question: "Using psychological ownership and its application in deterring the negative effects of toxic leadership." The research used the descriptive-analytical method. The sample was randomly selected from workers in some selected companies affiliated with the Ministry of Industry and Minerals in Baghdad, and the sample size reached 124 individuals. One of the most important results is that there is an effect of the psychological ownership variable, based on the
... Show MoreKamel, S.H., R.F. Al-Jassani and H.A. Al-Shammari. 2022. Effects of Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis Isolates and Biologically Synthesized Silver Nanoparticles on Cellulase Enzyme Activity in Workers' Digestive System of the Termite Microcerotermes diversus Silv. Arab Journal of Plant Protection, 40(4): 315-324. https://doi.org/10.22268/AJPP-40.4.315324 The purpose of this study was to investigate the effect of different bacterial isolates of P. fluorescens and B. t. tenebrionis and silver nanoparticles on the activity of the cellulase enzyme in termites' middle digestive system and its role in glucose release by treating cellulose media with bacterial strains and nanoparticles. Ultraviolet spectroscopy re
... Show MoreThere is no doubt that the achievement of the manuscripts is important in a place as it is based on reviving the heritage of the Islamic nation, as well as engaging in the prophetic hadith and its sciences pride for every Muslim, and this prompted me to achieve a manuscript message that serves this aspect i.e. the science of the prophetic hadith, and in an important subject that needs to stand on Each of the people, as well as the one who cares about the science of hadith and this topic is: Explaining the hadith of the people is partners in three, to the scholar Muhammad bin Ismail, famous for the Prince Al-Sanani, mentioning his methods and evidence, and their degree of health and weakness, and the statement of what is intended of him,
... Show MoreResearch Summary
This research is an attempt to explain the Qur’anic verses of the vision in the practical divine vision on the Day of Resurrection, and the legal texts narrated from the Companions regarding the vision of the Prophet, may God’s prayers and peace be upon him, regarding the vision of the Prophet, may God bless him and grant him peace, regarding the vision of the Prophet, may God’s prayers and peace be upon him, regarding the vision of the Prophet, may God bless him and grant him peace He was greeted with regard to vision, and he explained the two sayings of Ibn Abbas and Aisha on the same subject, including an area of conflict between them.
In this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion
... Show MoreAnaemia is a common extra-articular manifestation of rheumatoid arthritis (RA) where anaemia of chronic disease (ACD) and iron deficiency anaemia (IDA) are the two most frequent types. The distinction between these two types of anaemia has always been challenging requiring sophisticated techniques. Serum transferrin receptor (sTfR) a truncated soluble form of the transferrin receptor is one of the parameters that is influenced by the Iron content and supply to the erythrons and is not affected by inflammatory status and therefore the use of the sTfR/log ferritin (sTfR-F) index can be a reliable indicator of functional iron deficiency.
Background: L. sativum, are traditionally used for the treatment of various diseases and thought to have medicinal value. Isolates from many part of the world is now multidrug resistant. Therefore, there is an urgent need to look for and test an alternative herbal drug.
Objective: The present study aimed to evaluate the antibacterial activity of L. Sativum seed extract against multi drug resistant (MDR) and sensitive Pseudomonas aeruginosa clinical isolates.
Subjects and Methods: An ethanolic and aqueous stock extracts were prepared from L. sativum seed plant then serial dilutions were prepared and the obtained concentrations (50, 25, 12.5 and 6.2 mg/ml) were tested against 30 multidrug-resistan
... Show MoreThe concept of deficit in public budget becomes a chronic economic phenomenon in most of the world, whether the advanced countries or developing countries. Despite the difference in the visions of the economic schools to accept or reject the deficit in public budget but the opinion that prevailed is the necessity of the state to reduce the public spending which led to a continuous deficits in the public budget which consequently increased the government borrowing ,increase income taxes and wealth, consequently this weakened the in motivation in private investment which contributed to the increase of in factionary stagnation , so that governments have to cover the lack of local funding sources which become difficult to be eq
... Show More