Preferred Language
Articles
/
QkI1xZkBMeyNPGM3n7jF
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The instrumental support search strategies and avoid coping to psychological stressors and their relationship to the cognitive motivation of Al-Anbar University students.
...Show More Authors

the Current research aims to identify the psychological stressors coping strategies and their relationship to the cognitive motivation among Al-Anbar University students through the following hypotheses: 1) no statistically significant differences at a level (0.05) among the sample according to the instrumental support strategy depending on the variable type and specialization, 2) No statistically significant differences at a level (0.05) among the sample in regard of coping avoiding strategy depending on the variable type and specialization, 3) There is no statistically significant difference at a level (0.05) in cognitive motivation level among Al-Anbar University students, 4) No statistically significant differences at a level (0.05)

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Culture Consumption in an Increase of Deception Marketing , a Sample Survey of Cosmetic Users Employees College of Administration & Economics / University of Mosul
...Show More Authors

Economics / University of Mosul

 

Abstract

The spread of the phenomenon of excessive buying in our society, especially for cosmetics, and at the same time increase the marketing deception by the organizations to take quick profit 'and accordingly was identified the problem of research in several questions, including:

Is there a significant effect of consumption culture on marketing deception?                                                &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Survey theopinions professional and academics on building the strategy of internal audit function and the possibility of keeping abreast of developments
...Show More Authors

The research problem is clearly deficient suffered by the internal audit function in all institutions of Iraq, as a result of the lack of sponsor organizations for this profession and there is no law or local legislation determine its powers and its responsibilities and scope of work As well as the lack of interest of senior management in economic units that function, as it focuses its work on the scope of financial and accounting matters only So required to rebuild this function in line with the current developments as well as the lack of a framework that defines the strategy of this function, and it came the idea of research to find out how to create a regulatory method for re-strategic construction of the internal audit function depen

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 15 2023
Journal Name
2023 6th International Conference On Engineering Technology And Its Applications (iiceta)
Methodology for the Design and Programming Methods for a Smart Home
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
The Journal Of Immunology
Protective effects of Δ9-Tetrahydrocannabinol (THC) results from alteration in lung dysbiosis mediated by SEB-induced acute lung injury
...Show More Authors
Abstract<p>Inhalation of Staphylococcal Enterotoxin B (SEB) is known to induce acute lung injury (ALI) and studies from our laboratory have shown that THC, a psychoactive ingredient found in Cannabis sativa, can attenuate the ALI. In the current study, we investigated the role played by lung microbiota in ALI with or without THC treatment. A dual-dose of SEB was given to C3H/HeJ mice, which were then treated either with vehicle or THC. SEB-administration caused ALI and 100% mortality while all THC-treated mice survived and suppressed the inflammation in the lungs. Furthermore, lung microbiota was collected and 16S rRNA sequencing was performed. The data were analyzed to determine the alpha and b</p> ... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Survey study of intestinal parasites on Fresh vegetables collected from some Baghdad Sales and its role in human infection
...Show More Authors

Fresh vegetables are an important part of a healthy diet. The consumption of raw vegetables without cooking or good washing can be a major rout of transmission to the parasitic infection. The goal of this study was to determine the intestinal parasitic contamination of fresh vegetables from vegetables sales markets in Baghdad province during the different above months of the year. A total of 303 samples of different vegetables were randomly selected from three wholesale markets distributed through different regions in Baghdad (East, West and South) and then were examined by a floatation method. The present study showed that the collected vegetables were contaminated with 12 species of intestinal parasites, and the total percentage of contam

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 15 2022
Journal Name
Bionatura
Survey the Microbial Load in the Tigris River in South of Baghdad City and Some of the Physiochemical Parameters
...Show More Authors

This study included an analysis of three stations (Al Dora, Al Za'franiya, and Arab Ejbur) chosen to study the Physiochemical and microorganism (Fungi and Bacteria) loud of the Tigris River in the southern section of Baghdad city. The result of this research shows that the highest temperature recorded in summer in Al Za'franiya was 37Co, while the lowest temperature recorded in winter in Al Dora was 9Co. and the value of pH recorded the highest in summer it was 7.9 in Arab Ejbur, and the lowest value was in winter 7.1 in Al Dora regions, While Total Organic Carbon (TOC) shows the highest values found in the summer was 6.7 Mg L-1in Al Za'franiya Samples, and the lowest values were 2.0 Mg L-1in Arab Ejbur during the winter. The more f

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
"Acquired organizational immune and its impact on the application of knowledge management strategies" Analytical study of the opinions of a sample of Lecturer staff at the Technical College of Engineering and the Technical Institute of Amara
...Show More Authors

             The present study aims to reveal the extent of the influence of the acquired organizational immune through its dimensions (organizational vaccination, organizational learning, organizational memory, and benchmarking) in the application of knowledge management strategies in its two dimensions (codification strategy, personalization strategy) as well as clarifying that influential relationship between the study variables Because of its importance in reducing resistance to change by responding to the requirements of the environment. A set of main and sub-hypotheses emerged from the study, which was formulated in view of the hypothesis scheme of the study, and i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref