News

by Cyril Ha

High Level Network Diagram with Admin Firewall added
Background​ Information System Security has been a key concern over the past many years as more and more business processes rely on Information Technology to operate. Alike many other organizations, the usual first line of defense would be Internet protection with security devices such as a ...

by JUCC ISTF

Eavesdropping and manipulation
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ More and more transactions are performed online. Thus, a secured connection has to be ensured between the server and the client. However, connection mainly requires just a server ...

by S K Tsui

What is IoT? The Internet of Things (IoT) refers to billions of network devices, sensors and actuators around the world capable of gathering data (e.g. temperature, location, etc.) from the environment and sharing the data across the Internet. The data collected will then be analyzed, processed and ...

by Tony Chan

​ Since the first release of Windows 10 in July 2015, Microsoft has been providing feature updates for the operating system twice a year. Each version of Windows 10 was serviced with quality updates up to 18 months after its release. Users are strongly advised to upgrade their devices to the latest ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ In universities, some data have to be shared with students, staff, guests whereas others have to remain protected. At the same time, the number of data leak and unauthorized ...

by Eric Shai

The CityUWiki, a collaborative platform based on Microsoft SharePoint 2010 has been launched for almost 10 years. Today, there are over 100 sites hosting on this platform. Users have enjoyed the advantage of using it for document management, shared calendar of resource bookings, etc. In order to ...

by Adams Chan (OCIO)

There could be many reasons to start a web project: a new initiative, a new campaign, a new policy, headship turnover in the department where the websites are designated to; the web masters left the University and therefore lack of support; or when the company supporting the website does not deliver ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Every two years the number of data in the world is multiplied by two 1. Data do not remain in the corporate network; they are shared with outside collaborators. Thus, firewall ...

by Joe Chow

Advanced Threat Protection
What is Advanced Threat Protection? Advanced threat protection (ATP) is a proactive security solution that defends against attacks by malware. One of its important goals is to prevent any malware from reaching and running in the protected devices. Usually, ATP deploys on cloud where files from the ...

by Joe Chow

In the previous two articles ( Ref: September 2015 and March 2016), we have introduced Windows 10 and its deployment plan on both Student LAN and Staff LAN. Subsequently, the Computing Services Centre (CSC) deployed Windows 10 for teaching and learning in the CSC teaching studios, lecture theatres ...