Internet Services
- Account and Access Management
-
Application and Data Management
- AIMS and Banner
- API Gateway and API Management
- Central Payment Gateway
- CityU Mobile App
- CityU Portal
- CityU Scholars
- Degree Auditing and Academic Planning (DegreeWorks)
- e-Recruitment
- Finance and Procurement System (Oracle e-Business Suite)
- Grade Reporting (i-Assessment)
- Mobile App Publication
- Research Project Management System (ERIC)
- Booking Systems
- Communication and Collaboration
- Cloud, Data Centre and Server Hosting
- IT Security
- Network Connectivity and Management
-
End User Computing and Desktop Management
- Cloud Storage
- Computer Set Up and Configurations
- Computers Management in Lecture Theatres and Classrooms
- Data Removal Service
- Desktop Management
- Express Terminals
- Robotic Process Automation
- Information Classification and Protection
- Mobile Device Management
- Open Access Terminals
- Online Survey
- Printer & Print Queue Management
- Remote Desktop
- Shared Network Drive
- Teaching Studios (Computer Laboratories)
- URL Shortener (ShortURL)
- Virtual Desktop Service
- e-Signature Service
- Printing and Scanning Facilities
- Software Licenses and Deployment
- Teaching and Learning Support
- User Communication and Training
- Web Hosting
- High-Performance Computing (HPC) and Research Computing
- Smart Campus and AV
- User Support
Contact Information
Firewall Security Policies
Based on the best security design principles, the campus network was segregated into different security zones. The network communication among security zones are established by various interconnecting routers and firewalls. The firewall security rules, deployed in the interconnecting firewalls, control the firewall to allow or deny the flow of specific network traffic between security zones. Through the firewall security policies service, IT service owners can request for appropriate firewall security rules to provide security protection and the controlled network traffic to deliver an IT service. With reference to the industrial security best practices, principles as well as the existing security policies, the network security team will review the firewall security policy service request. Further discussion with the requestor and Information Security Unit (ISU/OCIO) will be carried out to refine the security policy before actual deployment.
Support & Contact
IT service owners (mainly Central IT and limited departmental IT service owners) may submit an online CSC Work Request to request for the service. For enquiries, please contact the Network Security team at ccnetsecadm@cityu.edu.hk or the CSC Service Desk.