INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY https://cirworld.com/index.php/ijct IJCT is scientific, open access, scholarly, peer-reviewed, fully referred international journal with DOI, ISSN, ICV and IF. en-US ijct@cirworld.com (Chief Editor) editor@cirworld.com (Editorial Support Team) Tue, 16 Jan 2018 16:04:09 +0000 OJS 3.1.0.1 http://blogs.law.harvard.edu/tech/rss 60 Impact of Ransomware on Cybersecurity https://cirworld.com/index.php/ijct/article/view/6750 <p>This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for cyber security knowledge and awareness plus types of tools used. The paper also discusses methodologies trends and research recommendation on cyber-security threats and provides probative strategic strategy.</p> YAYA ITAI, Emmanuel Onwubiko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://cirworld.com/index.php/ijct/article/view/6750 Tue, 16 Jan 2018 15:59:22 +0000 DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT https://cirworld.com/index.php/ijct/article/view/6930 <p>Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.</p> Jaspreet Kaur, Navdeep Kaler ##submission.copyrightStatement## https://cirworld.com/index.php/ijct/article/view/6930 Fri, 12 Jan 2018 00:00:00 +0000 The Analysis on the Key Factors of Fire Rescue Course Content Design – A Case Study of Miaoli County https://cirworld.com/index.php/ijct/article/view/6832 <p>This study discussed the factors affecting the design of the fire rescue and training courses for firefighters in Miaoli County. A questionnaire survey was conducted on firefighters. The content of the fire rescue courses held by Miaoli County Fire Bureau was discussed. Based on literature review and expert opinions upon Delphi method, this study analyzed the indicators of influencing factors. A hierarchical architecture was established. The weights affecting the design factor indicators affecting the fire rescue courses were obtained with the survey and analytic hierarchy process, and then were summarized and analyzed to establish a weight system.</p> Hung-Teng Chang, Chih-Yao Lo, Wen-Chia kevin Tu ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://cirworld.com/index.php/ijct/article/view/6832 Thu, 18 Jan 2018 08:32:51 +0000