Main navigation
News
December 2015
by Wilson Wong
![Verify a Website before Providing your Username/Password](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/phishing.jpg?itok=poCDY0I0)
Phishing email spreads over the Internet from time to time. You may have received suspicious email telling you that your computer account has problems/will expire/has exceeded quota/etc. and requires you to verify your identity by clicking on a URL (Uniform Resource Locator) to a web page, and then ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ There is a massive upsurge of mobile devices in the consumer market. Corporations are also demanding their employees to have instant connectivity to their working environment ...
September 2015
by JUCC ISTF
![Data Centre Management](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/03.jpg?itok=JCKYJUmz)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To ensure that data centres meet the reliability and performance needs of universities, and achieve the comprehensive protection from various security threats, a number of aspects ...
by JUCC ISTF
![Data Centre Management](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/03.jpg?itok=JCKYJUmz)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are ...
June 2015
by Wilson Wong
![](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/media/inline-image/IRM-1.jpg?itok=ar1LCK5B)
What is Information Rights Management? Information Rights Management (IRM) is a technology that protects sensitive information from unauthorized access. It allows information owners/publishers to distribute sensitive information to specific individuals. When an email or a document is protected by ...
by JUCC ISTF
![Data Centre Management](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/03.jpg?itok=JCKYJUmz)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ While data centre management is a cost-saving approach and brings a lot benefits including increased productivity, higher reliability, improved security and compliance, however ...
by JUCC ISTF
![Data Centre Management](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/03.jpg?itok=JCKYJUmz)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Data center management is a holistic process to oversee the operational and technical issues within a data centre or server room. It covers environmental control, physical ...
March 2015
by JUCC ISTF
![Protection against Hacking](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/hacking.jpg?itok=_ufBYIuh)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Hardening steps specific to each hacking category should be considered when planning the protection of the universities' systems against hacking. Hardening Steps against Scanning ...
by JUCC ISTF
![Protection against Hacking](/its/sites/g/files/asqsls6511/files/styles/thumbnail/public/news/2020-01/hacking.jpg?itok=_ufBYIuh)
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Common Types of Attack Vulnerability scanning Hacker may initiate vulnerability scanning on target organisation's network to proactively identify the vulnerabilities of computer ...