Main navigation
News
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The innovation of cloud computing has changed the way IT operations are deployed in various organisations around the world, including universities. Its benefits in cost saving ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ PaaS is intended to enable developers to build their own applications on top of the platform supported by cloud service providers. As a result, it tends to be more extensible than ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The benefits of cloud computing are both a friend and a foe from a security point of view. The massive concentrations of resources and shared usage pattern present a more ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features ...
by Samuel Wong

Every day, a large amount of sensitive information and data are being transferred through emails or movable devices. S ecurity threats increase as emails are uncontrollable after leaving the senders while movable devices can be lost or stolen easily. Hence, i t is important to secure sensitive ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing is a computing style in which scalable and flexible IT functionalities are delivered as a service to external customers using Internet technologies. Cloud ...
by Wilson Wong
It is always recommended that a strong password should be used to resist guessing and brute-force attacks and lower the risk of security breach. An account with a weak password, such as a word in dictionary, can easily be broken by a hacker. He/She may then read, modify or delete all your files and ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The following security recommendations or guidelines help secure your server: 1. Rename the Administrator Account - Renaming the Administrator Account will help to prevent a brute ...