As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Immune-mediated hepatitis is a severe impendence to human health, and no effective treatment is currently available. Therefore, new, safe, low-cost therapies are desperately required. Berbamine (BE), a natural substance obtained primarily from
This c
In the resent years, there is a robust scientific interest in discovery of new anti-septic and anti-oxidant naturally products with no/or limited side effects. The current study aimed to investigate the protective role of the quercetin on inflammations induced by lipopolysaccharide (LPS) in male mice A number of criteria included i.e. liver and spleen index and IL-6 and IL1-β cytokines level in spleen homogenate were considered. Sixty male mice (8-9 week age) was divided into six groups and treated for 5 days as the following: the first group represented control, the second and third group were injected with 5, 10 mg/kg b.w doses of quercetin respectively. While the fourth and fifth groups were co-treatment with (5, 10 mg/kg b.w.) intraper
... Show MoreRed cabbage and garlic extracts have protective effect against liver damage induced by fumonisin B1 (FB1) in male mice was studied. Randomly sixty mice have been divided in to six groups. Group one are the healthy mice, Group two are mice received oral dose of only FB-1 (100 μg/kg.b.w) once on daily for 1 month, Group three: mice received with red cabbage extract (500 mg/kg.bw) plus FB1, Group four: mice receiving just red cabbage extracts, Group five: mice receiving garlic extract (500mg/kg.bw) plus FB1, group 6: mice received only garlic extract. After finished the experiment, samples of blood were used for biochemical examination. The results indicated that group (2) mice treated
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThe research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.
A survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.
The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.
Abstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.