Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Information Technology Capstone Research Project Reports

Theses/Dissertations

Information technology

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …


Ransomware In High-Risk Environments, Shallaw M. Aziz Dec 2016

Ransomware In High-Risk Environments, Shallaw M. Aziz

Information Technology Capstone Research Project Reports

In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms …