INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2018-01-18T10:17:41+00:00 Chief Editor Open Journal Systems IJCT is scientific, open access, scholarly, peer-reviewed, fully referred international journal with DOI, ISSN, ICV and IF. Impact of Ransomware on Cybersecurity 2018-01-17T10:17:32+00:00 YAYA ITAI Emmanuel Onwubiko <p>This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for cyber security knowledge and awareness plus types of tools used. The paper also discusses methodologies trends and research recommendation on cyber-security threats and provides probative strategic strategy.</p> 2018-01-16T15:59:22+00:00 ##submission.copyrightStatement## DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT 2018-01-17T17:21:41+00:00 Jaspreet Kaur Navdeep Kaler <p>Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.</p> 2018-01-12T00:00:00+00:00 ##submission.copyrightStatement## The Analysis on the Key Factors of Fire Rescue Course Content Design – A Case Study of Miaoli County 2018-01-18T10:17:41+00:00 Hung-Teng Chang Chih-Yao Lo Wen-Chia kevin Tu <p>This study discussed the factors affecting the design of the fire rescue and training courses for firefighters in Miaoli County. A questionnaire survey was conducted on firefighters. The content of the fire rescue courses held by Miaoli County Fire Bureau was discussed. Based on literature review and expert opinions upon Delphi method, this study analyzed the indicators of influencing factors. A hierarchical architecture was established. The weights affecting the design factor indicators affecting the fire rescue courses were obtained with the survey and analytic hierarchy process, and then were summarized and analyzed to establish a weight system.</p> 2018-01-18T08:32:51+00:00 ##submission.copyrightStatement##