{"id":268,"date":"2021-05-13T10:10:28","date_gmt":"2021-05-13T10:10:28","guid":{"rendered":"https:\/\/www.hkmu.edu.hk\/itu\/?page_id=268"},"modified":"2021-08-12T15:15:02","modified_gmt":"2021-08-12T07:15:02","slug":"information-security-scanning","status":"publish","type":"page","link":"https:\/\/www-uat.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","title":{"rendered":"Information Security Scanning"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"268\" class=\"elementor elementor-268\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"wavo-column-gap-default elementor-section elementor-top-section elementor-element elementor-element-34b2083 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34b2083\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66279523\" data-id=\"66279523\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e31242 elementor-widget elementor-widget-text-editor\" data-id=\"6e31242\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n<h2>About Information Security Scanning<\/h2>\n\n<p>\u00a0As part of the Information Security measures,\u00a0<strong>ALL<\/strong>\u00a0new servers must pass an Information Security Scanning process before going to production. Professional tools and applications will be used to perform the Information Security Scanning on the target servers. If there is any alarm (security hole) discovered, the server will\u00a0<strong>NOT\u00a0<\/strong><strong>be allowed to connect to the production network<\/strong>. Moreover, the system administrator of the server will be requested to fix the security hole(s) and re-scan would be applied until no alarm is found.\u00a0<\/p>\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-5178\" src=\"https:\/\/www-uat.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-43.png\" alt=\"\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/staff.intranet.hkmu.edu.hk\/staff_handbook\/staff_is_scanning.pdf\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-5177\" src=\"https:\/\/www-uat.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-42.png\" alt=\"\" width=\"253\" height=\"95\" \/><\/a><\/figure>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Information Security Scanning \u00a0As part of the Information Security measures,\u00a0ALL\u00a0new servers must pass an Information Security Scanning process before going to production. Professional tools and applications will be used to perform the Information Security Scanning on the target servers. If there is any alarm (security hole) discovered, the server will\u00a0NOT\u00a0be allowed to connect to...<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":224,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"content_default_1.php","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"_links":{"self":[{"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268"}],"collection":[{"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":4,"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268\/revisions"}],"predecessor-version":[{"id":11752,"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268\/revisions\/11752"}],"up":[{"embeddable":true,"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/224"}],"wp:attachment":[{"href":"https:\/\/www-uat.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/media?parent=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}