As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Active learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consis
... Show MoreBackground: Decalcification of surface enamel adjacent to fixed orthodontic appliances, in the form of white spot lesions, is a wide spread and familiar well-known side effect of orthodontic treatment. The present study was carried out to evaluate the effect of enamel protective agent (Clinpro white varnish) on shear and tensile bond strength of Dentaurum orthodontic stainless steel brackets by using 3M Unitek and Ormco as orthodontic adhesive agents. Materials and methods: Sixty-four extracted human upper first premolar teeth were selected and randomly divided into two groups with 32 teeth each, representing the shear and tensile bond strength testing groups. Then according to the type of bonding adhesive and the addition of Clinpro before
... Show MorePurpose: The research aims to diagnose the current availability of knowledge workers characteristics and the role of these characteristics in knowledge acquision in the city of Sulaimaniya Directorate of Electricity, and to identify the differences between personal and occupational characteristics of a sample of research and its impact on the availability of such properties.Design/methodology/approach :to achieve the objectives of the research questionnaire was developed especially for it and then distributed to a sample of engineers and technicians working in the Directorate of Electricity city of Sulaimaniya, where the sample of the research (52) respondents.
Findings: the most important conclusions reached
... Show More
This research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreThe official spokesperson considered responsible for the transmission of information and communication messages that convey the government’s view on the various political and economic issues that affect the public opinion towards the performance achieved by the various governmental institutions and for the purpose of communicating with the media in a positive and effective manner, a number of institutions in the world in general and in Iraq in particular have nominated a spokesman to coordinate the efforts and the dissemination of news and the preparation of press conferences to contribute to the achievement of a positive and effective level between the government and the media, so this study has tackled to deal with the credibility of
... Show MoreListening comprehension of Iraqi EFL college students are not given time for practice, and incorporate in the programme of the Department of English, therefore, students are not well-prepared to comprehend the spoken language also the Iraqi EFL College students are deficient in comprehending the spoken English. So, listening strategies require a larger amount of consistent practice. The present study aims at finding out the effect of teaching the proposed listening strategies programme on EFL university students' listening comprehension. The sample consists of 104 of 1st year college students at the Department of English Language, College of Education Ibn-Rushed for Humanities. The programme deals with the following strategies: summrazing-n
... Show MorePersuasion is an indispensable skill in everyday life; that is why, it has aroused researchers’ interest. This study aims to investigate the most frequently used persuasive strategies in texting WHO COVID-19 Virtual Press Conferences and explore how these strategies are employed to achieve persuasive messages.To this end, a text of WHO COVID-19 Virtual Press Conferences has been chosen randomly to be analyzed based on Dillard and Shen’s (2013) “Persuasive strategies in Health Campaigns”. A qualitative method has been adopted in analyzing the selected data to investigate the credibility and validity of the persuasive strategies used in such a domain. Findings have shown that most of the persuasive appeals based on the adopted mode
... Show More