Preferred Language
Articles
/
QkI1xZkBMeyNPGM3n7jF
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Strategies of Rebulding Iraqi Cities That War Destroyed
...Show More Authors

This study includes the rebuilding of cities that war destroyed, which include some of the special policies that should be followed in order to build cities that war destroyed and which have importance in the national and humanitarian level, as well as some international experiences discussed including Warsaw, and the regional experiences, including Lebanon and concentrates on the foundation stone and evaluate it with global and regional experiences so that we can concluded with an integrated strategy that will achieve the best results in doing the reality that we live in these cities which are suffering from such disasters . In order to achieve the best goals we should review the best concepts and theories related to reconstruction afte

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF PREDATOR AND PARASITOID INSECTS IN DUHOK PROVINCE, KURDISTAN REGION, IRAQ
...Show More Authors

A total of 47 species belonging to 46 genera, 34 subfamilies, 23 families and 7 orders of predator and parasitoid insects were collected and identified. The survey was conducted throughout the program held by the General Directorate of Agriculture-Duhok, in cooperating with the College of Agricultural Engineering Sciences in Duhok Province, Kurdistan Region, Iraq from May 2013 to April 2014.
The species hosts, collecting date, locality and distributions are given. The current checklist also included some species previously collected by other researchers in Duhok Province.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 12 2024
Journal Name
Mustansiriyah Journal Of Sports Science
The impact of the use of numbered head and brainstorming strategies to learn handspring on the Vault table in artistic gymnastics for Men
...Show More Authors

The aim of the study was to identify the use of the strategies of numbered heads and brainstorming in learning handspring on the Vault table in artistic gymnastics for Men for the third grade students in the collage of Physical Education and Sport Sciences, as well as to identify the best group among the three research groups (number of heads numbered,, brainstorming strategies And the traditional style group) to learn the skill under study. Using the experimental method, the research subject included the third grade students in the collage of Physical Education and Sports Sciences / University of Baghdad, and randomly by lot, 12 students were selected for each of the three research groups. The study consisted of the arithmetic mean

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 25 2023
Journal Name
International Journal Of Energy Production And Management
Reducing Energy Consumption in Iraqi Campuses with Passive Building Strategies: A Case Study at Al-Khwarizmi College of Engineering
...Show More Authors

University campuses in Iraq are substantial energy consumers, with consumption increasing significantly during periods of high temperatures, underscoring the necessity to enhance their energy performance. Energy simulation tools offer valuable insights into evaluating and improving the energy efficiency of buildings. This study focuses on simulating passive architectural design for three selected buildings at Al-Khwarizmi College of Engineering (AKCOE) to examine the effectiveness of their cooling systems. DesignBuilder software was employed, and climatic data for a year in Baghdad was collected to assess the influence of passive architectural strategies on the thermal performance of the targeted buildings. The simulations revealed that the

... Show More
Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Strategic orientation and its reflection on the Learning organization: Survey study of a sample of Makers decision the Iraqi Ministry of Communications
...Show More Authors

The current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 22 2021
Journal Name
Plos One
Awareness and preparedness of healthcare workers against the first wave of the COVID-19 pandemic: A cross-sectional survey across 57 countries
...Show More Authors
Background

Since the COVID-19 pandemic began, there have been concerns related to the preparedness of healthcare workers (HCWs). This study aimed to describe the level of awareness and preparedness of hospital HCWs at the time of the first wave.

Methods

This multinational, multicenter, cross-sectional survey was conducted among hospital HCWs from February to May 2020. We used a hierarchical logistic regression multivariate analysis to adjust the influence of variables based on awareness and preparedness. We then used association rule mining to identify relationships between HCW confidence in handling suspected

... Show More
View Publication
Scopus (27)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Journal Of Education And Health Promotion
Nurses' knowledge and protective health behaviors about prevention of COVID-19 pandemic complications at Baghdad Teaching Hospitals
...Show More Authors
BACKGROUND:

Coronavirus disease (COVID-19) is a global pandemic caused by the severe acute respiratory syndrome coronavirus, SARS-CoV-2. Infection with SARS-CoV-2 primarily occurs through binding to angiotensin-converting enzyme-2 (ACE2), which is abundantly expressed in various anatomical sites, including the nasopharynx, lungs, cardiovascular system, and gastrointestinal and genitourinary tracts. This study aimed to nurses' knowledge and protective health behaviors about prevention of covid-19 pandemic complications.

MATERIALS AND METHODS:

A descriptive design stud

... Show More
View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Research Journal Of Pharmacy And Technology
Evaluation of Hesperidin Protective Effect on Lipopolysaccharide-Induced Inflammation and lipid Peroxidation in BALB/C Mail Mice
...Show More Authors

View Publication
Scopus (5)
Crossref (7)
Scopus Crossref