News

by Joseph Leung

According to our past experience, more than 50% of incoming emails are possibly spam in nature. These emails not only waste our system resources, but also cause delay of normal email delivery. Users would be annoyed, and even worse, they have to take security risk when opening the message or the ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Websites and web applications are often used by universities for public access and provide required services to their end-users, including staff and students, round-the-clock (e.g ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The innovation of cloud computing has changed the way IT operations are deployed in various organisations around the world, including universities. Its benefits in cost saving ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ PaaS is intended to enable developers to build their own applications on top of the platform supported by cloud service providers. As a result, it tends to be more extensible than ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The benefits of cloud computing are both a friend and a foe from a security point of view. The massive concentrations of resources and shared usage pattern present a more ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features ...

by Samuel Wong

Conventional Interface
Every day, a large amount of sensitive information and data are being transferred through emails or movable devices. S ecurity threats increase as emails are uncontrollable after leaving the senders while movable devices can be lost or stolen easily. Hence, i t is important to secure sensitive ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing is a computing style in which scalable and flexible IT functionalities are delivered as a service to external customers using Internet technologies. Cloud ...