Internet Services
- Account and Access Management
-
Application and Data Management
- AIMS and Banner
- API Gateway and API Management
- Central Payment Gateway
- CityU Mobile App
- CityU Portal
- CityU Scholars
- Degree Auditing and Academic Planning (DegreeWorks)
- e-Recruitment
- Finance and Procurement System (Oracle e-Business Suite)
- Grade Reporting (i-Assessment)
- Mobile App Publication
- Research Project Management System (ERIC)
- Booking Systems
- Communication and Collaboration
- Cloud, Data Centre and Server Hosting
- IT Security
- Network Connectivity and Management
-
End User Computing and Desktop Management
- Cloud Storage
- Computer Set Up and Configurations
- Computers Management in Lecture Theatres and Classrooms
- Data Removal Service
- Desktop Management
- Express Terminals
- Robotic Process Automation
- Information Classification and Protection
- Mobile Device Management
- Open Access Terminals
- Online Survey
- Printer & Print Queue Management
- Remote Desktop
- Shared Network Drive
- Teaching Studios (Computer Laboratories)
- URL Shortener (ShortURL)
- Virtual Desktop Service
- e-Signature Service
- Printing and Scanning Facilities
- Software Licenses and Deployment
- Teaching and Learning Support
- User Communication and Training
- Web Hosting
- High-Performance Computing (HPC) and Research Computing
- Smart Campus and AV
- User Support
Contact Information
System Vulnerability Scanning
In IT security, vulnerabilities are the weaknesses in a system that renders it susceptible to attacks, causing security threats to an organisation. The system can be any application, any server running a particular server OS version, any desktop running a desktop OS version, or any network appliance. Identifying these vulnerabilities at an early stage enables system administrators to apply patches or fixes to protect the systems from any possible intrusions targeted at these weaknesses. A vulnerability scanner helps to discover all systems connected to the enterprise network, including all devices like servers, desktops, laptops, printers, firewalls and virtual machines. It then conducts a thorough scanning to identify the vulnerabilities and weaknesses in these assets. It is common to have weaknesses identified in a system due to obsolete software, misconfigurations and unsecure protocols. The scanner assists to look for the holes and provides detailed reports on the corresponding severity and remediation.
User Guides & FAQs
Support & Contact
To request for scanning of any IT systems, please contact the Information Security Unit at infosec@cityu.edu.hk.