Text Only

Information Security

Email Security

Security threats and particularly malware come with email are increasing in frequency, severity, and sophistication. How can ICTO battle this growing concern?

ICTO has two levels of protection. The first level is on Secure Email Gateway and the second level is ESET Endpoint Security installed on the office computer.

Anti-Spyware

Spyware applications are programs and files that hide on your PCs. These programs may send information from the user’s computer without their knowledge whenever the computer connects to the Internet. They allow hackers and advertising companies to track your every move, both online and even when you work offline. They can track the web sites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords.

Anti-Virus

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software.

Besides the ICTO computer systems, computer room and office computer have anti-virus software installed, we also adopts a home license and Android license for students and staff. An authorization process is needed to make sure you are one of the active students and staff.

Data Encryption

Data Encryption is the conversion of data into a form, called cipher text, which is not easily understood by unauthorized people. Nowadays many confidential or private data are stored on a computer or mobile computing device. Many users also use USB flash drives for storing data. If you have to store private data, it is absolutely necessary to encrypt your data to prevent unauthorized disclosure of private data if your USB flash drive is lost.

Data Encryption is recommended for protection of your confidential data.

RMS File Protection Service

RMS File Protection Service provides information rights management with encryption feature for staff to secure documents with personal information, exam papers or research data and thesis, etc.

SSH Secure Shell

Secure Shell (ssh) is a secured replacement for telnet, rlogin, rsh and rcp. It uses encryption to keep information that you send over the network from being seen by others. You are recommended to use SSH instead of TELNET to perform any type of remote connection.

UMPASS Authentication Service

UMPASS Authentication Service is a central place where let users login the application securely. Users only need to remember one set of credential for accessing all support applications.

Copyright © Information and Communication Technology Office (ICTO). All rights reserved.