As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Evaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c
... Show MoreThe aim of this research is to identify the extent to which the Conventional and Islamic banks are committed to implement the requirements of the corporate governance in its financial reports. In addition to its commitment to transparency and clarity in dealing with the shareholders and stockholders to protect their interests and to determine the impact of the commitment of the corporate governance on assessing the financial performance of the conventional and Islamic banks that participate in Bahrain Stock Exchange.
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreThe aim of the research was to prepare a scale of obstacles to achieving quality performance, field application from the point of view of fourth-stage female students, to identifyOn the difficulties and obstacles to achieving quality performance through field application from the students’ point of view for the topic (school administrative procedures, learners, cognitive achievement, school tools).The researchers used the descriptive approach in the research procedures as it is an appropriate approach to achieve the research objectives.,The following questions were asked:There are obstacles and difficulties faced by female students during the process of choosing schools, dealing with school administrations, and the difficulties fa
... Show MoreThe angiotensin converting enzyme (ACE) I\D gene polymorphism influences the blood ACE enzyme activity. Renoprotective effect of ACE inhibitors (ACEIs) varies among patients due to genetic variation, particularly in Renin-Angiotensin-Aldosterone System genes. This study investigates the genetic variations of ACE I\D and AGT1RA1166C gene polymorphisms in the antiproteinuric effect of ACEI therapy in type 2 diabetes mellitus (T2DM) patients. This is a cross-sectional study that included 76 T2DM patients who are ACEI users, divided into two groups: T2DM without diabetic kidney disease (DKD) included 31 patients, and T2DM with DKD included 45 patients. Urine samples were taken for measurement of urine albumin and creatinine, then calcul
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreGoal of research is to investigate the impact of the use of effective learning model in the collection of the fourth grade students/Department of physics in the material educational methods and the development of critical thinking .to teach this goal has been formulated hypothesis cefereeten zero subsidiary of the second hypothesis .To investigate the research hypothesis were selected sample of fourth-grade students of the department of physics at the univers
... Show MoreThis study measures the indicators of social and environmental performance of the contents of the administration's prepared reports on its social and environmental performance by comparing the actual performance with the indicators set within the standards of the Global Reports Initiative (GRI), In preparing this research, the researchers relied on studying the criteria of the Global Reporting Initiative, which aims to achieve a high level of performance disclosure under sustainability, In light of contemporary global trends towards achieving sustainable development and its disclosure and the orientations of economic institutions and units in different countries towards emphasizing the extent of commitment during practicing its a
... Show MoreOne of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreObjectives: Successful endodontic treatment outcome requires effective shaping and cleaning of root canals. This study aims to evaluate the smear layer removal after continuous chelation (CC) ) NaOCL\HEDP( and sequential chelation (SC) )NaOCL\EDTA( and their influence on the push-out bond strength (POBS) of Bio-C sealer. Materials and Methods: Palatal roots of the maxillary first molar (n=72) were divided into four groups (n=18) as follows: 3% NaOCL, SC: 3% NaOCL followed by 17% EDTA, CC: 3% NaOCL \9% HEDP and Distilled water. Thirty-two roots (n=8/group) were split longitudinally for smear layer evaluation using SEM. Forty roots were obturated with Guttapercha and Bio-C sealer using a single cone technique. Thre
... Show More