Text Only

Information Security

Email Security

Security threats and particularly malware come with email are increasing in frequency, severity, and sophistication. How can ICTO battle this growing concern?

ICTO has two levels of protection. The first level is on Secure Email Gateway and the second level is ESET Endpoint Security installed on the office computer.


Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software.

Besides the ICTO computer systems, computer room and office computer have anti-virus software installed, we also adopts a home license and Android license for students and staff. An authorization process is needed to make sure you are one of the active students and staff.

Data Encryption

Data Encryption is the conversion of data into a form, called cipher text, which is not easily understood by unauthorized people. Nowadays many confidential or private data are stored on a computer or mobile computing device. Many users also use USB flash drives for storing data. If you have to store private data, it is absolutely necessary to encrypt your data to prevent unauthorized disclosure of private data if your USB flash drive is lost.

Data Encryption is recommended for protection of your confidential data.

Two-Factor Authentication (2FA) Service

Two-factor authentication provides an extra layer of protection for your UMPASS account, designed to ensure that you are the only person accessing your account.

IT Security Assessment Service

IT Security Assessment Service provides two kinds of IT security scanning tool for servers, websites and web-based applications of UM. These tools can be used to detect IT security vulnerabilities and suggest applicable solutions.

RMS File Protection Service

RMS File Protection Service provides information rights management with encryption feature for staff to secure documents with personal information, exam papers or research data and thesis, etc.

SSH Secure Shell

The SSH protocol uses encryption to secure the connection between a client and a server. All user authentication, commands, output, and file transfers are encrypted to protect against attacks in the network.

SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol. It supports the full security and authentication functionality of SSH.

SSL Certificate Service

The SSL Certificate Service provides the digital certificate to enhance the security of network communication. This certificate service can be applied for web site or web-based application of UM.

UMPASS Authentication Service

UMPASS Authentication Service is a central place where let users login the application securely. Users only need to remember one set of credential for accessing all support applications.

User Privilege

General administrative staff are given standard user permission in ICTO computers.  This prevents the installation of unauthorized software and reduces security vulnerabilities and data leaks caused by malicious software and changes in system settings.  To strike a balance between security and convenience, the computers provided by ICTO are installed with a tool to elevate administrative privilege when needed.

Copyright © Information and Communication Technology Office (ICTO). All rights reserved.