Profile Image
Assist. Lecturer

عمار عبد المجيد غربي الشهابي

Research Interests

الجنس MALE
Place of Work Technical Engineering College for Computer and AI / Mosul
المنصب لايوجد
المؤهل Master
التخصص Data and information security
البريد الإلكتروني Ammarmajed@ntu.edu.iq
الهاتف 07740895385
العنوان موصل / حي الكفاءات, mosul, Mosul, Iraq

المهارات

الإبداع والابتكار والمبادرة (80%)
المرونة والقدرة على التكيف (90%)
القيادة وإدارة الفريق (75%)
مهارة العمل الجماعي (95%)
مهارة التواصل مع الآخرين (85%)
مهارة حل المشكلات (85%)
استخدام التكنولوجيا والمراقبة والتحكم (95%)
تكنولوجيا التصميم والبرمجة (90%)
التعليم والخبرة العملية

التعليم

دبلوم انظمة الحاسوب
Sep 2, 2001 - Aug 3, 2003

بكالوريوس علوم الحاسوب
Sep 1, 2004 - Aug 3, 2008

ماجستير علوم الحاسوب
Aug 1, 2018 - Sep 1, 2021

خبرة العمل

انترنيت الطلبة و المنتسبين و الاتصالات [مسؤول وحدة الانترنيت]
Jan 1, 2008 - Jun 10, 2014

في المعهد التقني نينوى

في المعهد التقني نينوى [مقرر قسم تقنيات انظمة الحاسوب]
Nov 1, 2021 - Nov 1, 2023

المنشورات

Honey Encryption Security Techniques: A Review Paper
Jun 17, 2022

المجلة مجلة الرافدين لعلوم الحاسوب و الرياضيات

publisher كلية علوم الحاسوب والرياضيات

DOI https://doi.org/10.33899/csmj.2022.174390

العدد 1

المجلد 16

From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form. The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key.

Read Publication