At a Glance
 
Central Software
CityVoD - CSC Forum Archive
Software List on CSC Student LAN

Location and Floor Plan of the CSC Teaching Studio Areas
Opening Hours of the CSC
Systems Maintenance Schedule
List of Blocked Network Cards / IP Addresses
List of CSC Representatives
List of Departmental Network Administrators
Staff Computer Courses
Sitemap
 
CSC e-Forms
 
Submit CSC Work Req.
Req. for Printing
Req. for Dump / Restore
Teaching Studio Booking / Cancellation
Email Alias Application
Apply for a New Domain Name
Remove an Existing Domain Name
Modify the Hosting of an Existing Domain Name
 
Useful Links
 
OCIO Home
IT Information for Students
IT Information for Staff
IT Information for Alumni
 
Got any questions, comments or suggestions? Contact the editors at ccnetcom@cityu.edu.hk
Issue 25 - September 2000
Network and Port Scanning is An Offence
By Annie Yu

Scanning the University network or the ports on the network is a normal exercise carried out by any network administrator. However, if it is performed without prior approval, it is considered as an offence. It will be disastrous if such activities are adopted by hackers who will make use of the University or external facilities to search for vulnerable systems within the University network or other sites as break-in targets. In fact, a number of incidents had occurred in the past whereby complaints had been received from other Internet sites. In one particular case, the children of a University staff had engaged in similar activities using the staff's PC. Although some of these cases were not intentional, nevertheless, they posed serious threats to the University network as well as the privacy of others, which immediately prompted the Information Systems Advisory Committee to take actions.

In mid February 2000, the network/port scanning policy was established and enforced by the Computing Services Centre (CSC) to take disciplinary actions if 'unusual' or 'unauthorised' network or port scanning on either the University network or sites outside the University has been detected. Depending on the type of users, the responsible parties are penalised accordingly:

  1. If a staff member is found performing unauthorised network and port scanning activities, for the first time, he/she will be warned and his/her department head will be informed. Further offences will be reported to the Human Resources Office for action.

  2. If a student is found performing unauthorised network or port scanning activities, for the first time, he/she will be either warned (by e-mail or in person) or his/her computer account(s) suspended for one week. His/her department will also be notified. On the second offence, his/her computer account will be suspended for a month. Further offences thereafter will be reported to the Student Disciplinary Committee for action.

  3. The network administer of a department is allowed to scan the systems within the department subject to the approval from the department head and prior notification in writing to the CSC.

Sad to say, after implementation of the network/port scanning policy, unauthorised scanning activities still exist especially in the modem pool. Gathered from the logged events detected by gateway routers maintained by the CSC, there were still students who violated the policy and were subsequently penalised for their actions. However, during the investigation, it was found that some scanning activities might have been performed by anonymous hackers using trojan horses such as NetBus and Back Orifice via compromised PCs of the students. Unfortunately, the students concerned were still liable to the outcome of such scanning activities since they are owners of the originating PCs. To avoid this situation from happening, it is important to bear the following in mind:

  1. Protect your account/password well and change your account password frequently

  2. Do not download/run unknown programs from the Internet

  3. Use updated personal firewall or equivalent programs to protect your PC

  4. Ask for help if you find that your PC behaves strangely

  5. Format your hard disk and re-install the system with care, if necessary or in doubt

  6. Refrain from lending your PC to others

In order to maintain a healthy computing environment, it is important that each and every one of us should follow the rules and policies set out by the University.

Also in this issue...

PC Upgrade in Full Full Swing
Wireless Versus Fixed Network Connection
How've the Notebook Loan Pools Been Doing?
Improvement of Weak Points of the Campus Network
It's Time to Upgrade Central Servers
Forthcoming Series of Seminars and Talks

 

 

Current & Back Issues
 
 
Search Articles
 
 
FAQs
 
Microsoft Windows10
Microsoft Windows 7
Office 365 ProPlus
Microsoft Office 2013
Microsoft Office 2010
中文支援常見問題
Internet Explorer 11
Internet Explorer 9
Email Services
Confidential Email
Wireless LAN
Virtual Desktop Service (VDS)
USB Flash Drive
Mirroring360
CityU SMS (for Department)
CityU SMS (for Staff & Student)
iPad (iOS 5.x)
Wiping a Mobile Device
Wiping Mass Storage Device
Handling Handheld Smart Devices for Service Maintenance, Recycling Use, and Disposal
Staff Account Renewal
Changing Local Administrator Password
McAfee Endpoint Security
Full Scan of Your Computer for Concealed Computer Virus
Anti-spyware
Computer Warranty Scheme Software Copyright Declaration and Compliance Observation
 
Technical Guides
 
AV Facilities User Guide
Connecting to Wireless LAN (WiFi)
VPN Connection Setup Guide BitLocker To Go User Guide
 
Copyright© Computing Services Centre, City University of Hong Kong. Best viewed in 1024x768 with IE. Javascript enabled. Last modified on Friday December 28 2018 .