News

December 2014

by JUCC ISTF

Protection against Hacking
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies. 1. Excessive Reporting and False ...

by JUCC ISTF

Protection against Hacking
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Introduction to Hacking In order to protect the universities' information systems against malicious attacks, IT professionals should obtain a basic understanding of the common ...

by Annie Yu

With technology moving along at a rate so fast that it is easy to fall behind if one does not stay up to date with one’s IT skill set. The Computing Services Centre (CSC) saw the training needs and had been running Staff Computer Courses and Student Computer Literacy courses for many years. Course ...

by S K Tsui, Cheung Sai Hung

wifi
CityU has been offering wireless LAN (Wi-Fi) service since year 1997. It enables us the freedom and flexibility of accessing the Internet without cable. With the sharp growth of different brands and models of Wi-Fi user devices being brought and used on campus which may run different Wi-Fi ...

by Kevin Chan

What is Lync Online? As the University has adopted Microsoft Office 365 (O365) not long ago, one of its module, Lync Online Service (Lync for short) is also offered in the software suite. Lync is a unified communication cloud service hosted by the Microsoft which supports various interactive ...

September 2014

by Henry Wong

University Email
With the successful migration of the University email systems for students and alumni from the on-premises systems to Microsoft Office 365 Exchange Online (“O365” is Microsoft’s cloud solution for educational institutions) in 2013, the Information Strategy and Governance Committee (ISGC) of the ...

by Joe Lee, Simpson Wong, Tony Chan

Relocation of Mac Lab To improve management of Teaching Studios, the Mac Lab (AC2-5607) has been relocated to room AC2-4101 on 4/F. All Mac machines, lockers, benches and the working environment are maintained. Room AC2-5607 is now equipped with advanced PCs providing two operating systems (Windows ...

by Tony Chan

Nowadays, the adoption of mobile devices such as tablets and smart phones are changing the way that people work. Using personal devices at work makes users feel more comfortable and work faster with their own customized and personalized settings, thus increases productivity levels as well as user ...

by JUCC ISTF

firewall
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Firewalls are part of the IT environment of universities and shall be secured in accordance with the universities' Information Security Policies and relevant industrial standards ...

by JUCC ISTF

firewall
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Like universities' other information systems, desktops or networks, firewalls are computing devices/applications and also have vulnerabilities exposed to certain type of ...

June 2014

by John Chan

Data Centre Management
Why Upgrade? Since the establishment of City University, the Computing Services Centre (CSC) was charged with the full responsibility of providing all Central IT services to the University to support all its administrative, academic and research works. Since then, the CSC has followed closely with ...

by Yeung Man

Since our last article (Ref: Network Computing Issue 43 – March 2005) on the Computer Account Management (CAM) System, the system has evolved to serve more than just simple maintenance tasks. Now it manages not only the accounts for students and alumni, but also those for staff, applicants, ex-staff ...

by Tony Chan

The Computing Services Centre (CSC) has successfully completed the first phase of the client virtualization project and, after the past Easter break, released around 130 virtualized workstations in one Teaching Studio (AC2-4200) and two Open Access Areas (AC2-G601 and AC2-5802) in the CSC Teaching ...

by JUCC ISTF

firewall
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Firewalls are one of the most critical devices or applications that protect universities' information systems and resources from unauthorised access or malicious attacks. To ...

by JUCC ISTF

firewall
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Any device that controls network traffic for security reasons can be called a firewall. It puts up a barrier that controls the flow of traffic between networks and is able to ...

March 2014

by JUCC ISTF

Patch Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated ...

by JUCC ISTF

Patch Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To build an effective patch management process that manages the risks from both external (i.e. vulnerabilities of the information systems) and internal factors (i.e ...

by Simpson Wong, Yeung Man

To better serve our users, the Computing Services Centre (CSC) has installed three sets of 42-inch LED TV panel beside the entrances of the CSC Teaching Studio Areas on G/F, 4/F and 5/F of Academic 2. AC2 G/F AC2 4/F AC2 5/F These panels display the availability of computers for student use. First ...

by Sunny Wong

Message from Microsoft "After 12 years, support for Windows XP will end on April 8, 2014. There will be no more security updates or technical support for the Windows XP operating system. It is very important that customers and partners migrate to a modern operating system…” (Microsoft, 2014) After ...

by Eric Shai

Nowadays, people use PCs, mobile devices to perform many activities on the internet, such as webmail, online shopping, e-banking, etc. Private information is frequently being transmitted across the internet. If these sensitive data are not transferred securely, they can easily be captured or stolen ...

by Tony Chan

Virtualization is an irreversible trend in the IT industry. It brings great benefits to enterprises by allowing better utilization of IT resources, simplifying IT administration, facilitating faster disaster recovery. For more discussion on its benefits, please refer to an earlier article “Moving ...