As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Nowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show MorePropaganda speech in the Gulf press articles about the Qatari crisis, an analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017, University of Baghdad, College of Media, Press Department, 2019. The problem of the research was to monitor the contents of propaganda messages to Saudi Arabia and the UAE regarding the Qatari crisis, especially with the escalation of propaganda media campaigns between the four boycotting countries on the one hand and Qatar on the other hand, in light of crises and conflicts in the Gulf region and the Arab region in general. The researcher used the survey method to answer the research questions and achieve its results. This res
... Show MoreThe compound Fe0.5CoxMg0.95-xO where (x= 0.025, 0.05, 0.075, 0.1) was prepared via the sol-gel technique. The crystalline nature of magnesium oxide was studied by X-ray powder diffraction (XRD) analysis, and the size of the sample crystals, ranging between (16.91-19.62nm), increased, while the lattice constant within the band (0.5337-0.4738 nm) decreased with increasing the cobalt concentration. The morphology of the specimens was studied by scanning electron microscopy (SEM) which shows images forming spherical granules in addition to the presence of interconnected chips. The presence of the elements involved in the super
t
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MorePolitical Discourse Analysis is an important linguistic study approach used by politicians to gain people support. The present paper sheds light on the figures of speech of emphasis in the televised debate between the two presidential elections candidates, Emmanuel Macron and Marine Le Pen and the distinctive effect they add to the political discourse to win general public support as well as the presidential elections.
The present paper provides a rudimentary definition and an analysis of the terms “discourse” and “political discourse” and traces the significant role played by politically directed televised Media and internet to support political pa
... Show MoreThe reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show MoreThe current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio
... Show Moresix specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y