A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many cases, an attacker who manages to obtain a valid ID of user’s session can use it to directly enter that session – often without arising user’s suspicion. A secure session management must be implemented in the development phase of web applications because it is the responsibility of the web application, and not the underlying web server.
Threat modeling is a systematic process that is used to identify threats and vulnerabilities in software and has become popular technique to help system designers think about the security threats that their system might face.
In this paper we design the threat modeling for session’s ID threat by using SeaMonster security modeling software, and then propose a secure session management that avoids the vulnerabilities. The proposed secure session management is designed to give trust authentication between the client and the server to avoid session hijacing attack by using both: server session’s ID and MAC address of the client.Visual Studio. Net 2008 is used in implementing the proposed system
Systemic lupus erythematosus (SLE) is the prototypic multisystem autoimmune disorder with a broad spectrum of clinical presentations encompassing almost all organs and tissues. Aimes of study determination of integrin- linked kinase 1(ILK-1) and anti-smith antibody(ASAB) levels in serum of Iraqi patients with systemic lupus erythematosus, in addition, that ILK-1 may be as a diagnostic marker of SLE disease, and study the effect of systemic lupus erythematosus on renal function in these patients. This study included 100 females’ patients with systemic lupus erythematosus attending to the Rheumatology Unit in Baghdad Teaching Hospital, Medical City, (Baghdad), in addition to 30 healthy females as controller group were chosen without any chr
... Show MoreOne of the most common public liver diseases over the world is fatty liver which contain alcoholic and non-alcoholic fatty liver. One-fourth among general population are impact Non-Alcoholic Fatty Liver Disease (NAFLD) in the worldwide.Retinol binding protein 4 (RBP4) is known as an adipokine, mainly synthesized and secreted from the liver and form adipose tissues. RBP4 acts as a transporter and specifically bound to retinol from liver to others tissues. Visfatin is an adipocytokine and mainly produced from visceral fat tissue, skeletal muscles as well as liver. Vitamin A absorbed, transported as retinyl esters to the liver then hydrolyzed to the retinol form and storage in hepatic stellate cells (HSCs) after reesterified with rigly
... Show MoreHouse 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
In this present paper , a special model was built to govern the equations of two dimensional peristaltic transport to nanofluid flow of a heat source in a tapered considered in an asymmetric channel. The equations of dimensionless temperature concentration are analytical solve under assumption slow Reynolds number and long wave length. Furthermore, the results that receive by expressing the maximum pressure rise communicates increased in case of non-Newtonian fluid when equated with Newtonian fluid. Finally, MATHEMATICA 11 program has been used to solve such system after obtaining the initial conditions. Most of the results of drawing for many are obtained via above program .
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
Background: Mouth breathing can lead to introduce cold, dry unprepared air that insults the tissue of oral cavity, nasopharynx and lung, leading in turn to pathological changes in oronasal cavity, nasopharyngeal and other respiratory tissue, mouth breathing associated with nasal obstruction may lead to many health problems, in particular oral health problems such as inflammation of gingiva, oral dryness, change in oral environment that may decrease pH, salivary flow rate and increase bacteria and dental caries.Aims of the present study were to assess the oral health condition among mouth breather associated with nasal obstruction, including dental caries, oral cleanliness and gingival health condition as well as to evaluate the changes in s
... Show MoreBackground: Saliva is one of the most important etiological host factors in relation to dental caries. It affects the carious process by its organic and inorganic constituents; in addition to its physiological functions as (flow rate, pH and buffer capacity). The aims of this study were to determine the concentrations of major elements (calcium and phosphorus) and trace elements (ferrous iron, nickel, chromium and aluminum) in saliva among a group of adolescent girls, and to explore the relation of these elements, flow rate and pH with dental caries. Material & Methods: The study group consisted of 25 girls with an age of 13-15 years old. Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
This research mainly aims to analyze local development strategy in Baghdad Governance, build the Strategic Model based on the study area's spatial interaction, and achieve the Trinity of Excellence based on the global model of excellence.
This research applied SWOT strategic analysis for the strengths and weaknesses of the internal environment and opportunities and threats of the external environment for the provincial council. In conclusion, the research specifies appropriate alternatives and choosing the best in line with the reality of the Baghdad Provincial Council. Also, the strategic goals in the national plan and the spatial interaction of the development goals,
... Show MoreThe research aims to shed light on the impact of the application of the electronic services system on electronic banking activities in a sample of Iraqi banks, as investment in technology is the most important factor for the success and future growth of administrative companies in general, and banking in particular, as global economic developments in the field of Technology has led the majority of banking sectors in the world to undergo deep reforms and radical changes in the entity of their systems and mechanisms to confront competition and keep pace with economic changes, as the concept of banking services and its diversity changed with it, especially since persistence in the traditional approach no longer gi
... Show More