News

by JUCC ISTF

mima-1
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ More and more transactions are performed online. Thus, a secured connection has to be ensured between the server and the client. However, connection mainly requires just a server authentication. The client identity is not checked, which allows attacker to intercept the communication and impersonate the user. This kind of attack is a Man-in-the Middle attack. This name is derived from basketball in which a player tries to intercept the ball that is exchanged between two other players.

by S K Tsui

iotwifi
What is IoT? The Internet of Things (IoT) refers to billions of network devices, sensors and actuators around the world capable of gathering data (e.g. temperature, location, etc.) from the environment and sharing the data across the Internet. The data collected will then be analyzed, processed and utilized for various purposes.

by Yuki Tam (OCIO)

mfa

by Tony Chan

win10-1
​Since the first release of Windows 10 in July 2015, Microsoft has been providing feature updates for the operating system twice a year.  Each version of Windows 10 was serviced with quality updates up to 18 months after its release. Users are strongly advised to upgrade their devices to the latest version of Windows 10 (i.e. feature update) to keep their devices secure before the current version reaches the end of support.

by JUCC ISTF

dbsec-1
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ In universities, some data have to be shared with students, staff, guests whereas others have to remain protected. At the same time, the number of data leak and unauthorized exposure to sensitive data increases dramatically. Therefore, concern for database security surges. This paper will expose the database management system; the encountered risks and finally focus on the security.

by Eric Shai

sharept-1
The CityUWiki, a collaborative platform based on Microsoft SharePoint 2010 has been launched for almost 10 years.

by Angel Lu and Dr. Crusher Wong

flipped_classroom
Flipped classroom approach has attracted a lot of attention because of its strong

by Adams Chan (OCIO)

wcm
There could be many reasons to start a web project: a new initiative, a new campaign, a new policy, headship turnover in the department where the websites are designated to; the web masters left the University and therefore lack of support; or when the company supporting the website does not deliver proper level of service.

by JUCC ISTF

datasecurity-5
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Every two years the number of data in the world is multiplied by two1. Data do not remain in the corporate network; they are shared with outside collaborators. Thus, firewall protection will not be enough; data themselves have to be protected in order to remain secured during transfer outside the local network. Therefore, a data centric security is mandatory.

by Dr. Crusher Wong (OCIO)

GamificationofLearning
Imagine that you had burnt the midnight oil to prepare for teaching of a new course. You had planned a myriad of learning activities including group projects with insightful topics. The first class came but students were just passively jotting notes. You tried to encourage them by asking a few critical questions and what you received was the sound of silence. Time flew; some fragmented project presentations demonstrated mysterious labor division among students.

CityU IT ChatBotCityU IT ChatBot×

We use cookies to ensure you get the best experience on our website.

More Information