{"id":268,"date":"2021-05-13T10:10:28","date_gmt":"2021-05-13T10:10:28","guid":{"rendered":"https:\/\/www.hkmu.edu.hk\/itu\/?page_id=268"},"modified":"2021-08-12T15:15:02","modified_gmt":"2021-08-12T07:15:02","slug":"information-security-scanning","status":"publish","type":"page","link":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","title":{"rendered":"Information Security Scanning"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"268\" class=\"elementor elementor-268\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"has_eae_slider wavo-column-gap-default elementor-section elementor-top-section elementor-element elementor-element-34b2083 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34b2083\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;},&quot;_id&quot;:&quot;044e32f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66279523\" data-id=\"66279523\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e31242 elementor-widget elementor-widget-text-editor\" data-id=\"6e31242\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n<h2>About Information Security Scanning<\/h2>\n\n<p>\u00a0As part of the Information Security measures,\u00a0<strong>ALL<\/strong>\u00a0new servers must pass an Information Security Scanning process before going to production. Professional tools and applications will be used to perform the Information Security Scanning on the target servers. If there is any alarm (security hole) discovered, the server will\u00a0<strong>NOT\u00a0<\/strong><strong>be allowed to connect to the production network<\/strong>. Moreover, the system administrator of the server will be requested to fix the security hole(s) and re-scan would be applied until no alarm is found.\u00a0<\/p>\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-5178\" src=\"https:\/\/www.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-43.png\" alt=\"\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/staff.intranet.hkmu.edu.hk\/staff_handbook\/staff_is_scanning.pdf\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-5177\" src=\"https:\/\/www.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-42.png\" alt=\"\" width=\"253\" height=\"95\" \/><\/a><\/figure>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Information Security Scanning \u00a0As part of the Information Security measures,\u00a0ALL\u00a0new servers must pass an Information Security Scanning process before going to production. Professional tools and applications will be used to perform the Information Security Scanning on the target servers. If there is any alarm (security hole) discovered, the server will\u00a0NOT\u00a0be allowed to connect to...<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":224,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"content_default_1.php","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.3 (Yoast SEO v21.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Scanning - Information Technology Office - Hong Kong Metropolitan University<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Scanning\" \/>\n<meta property=\"og:description\" content=\"About Information Security Scanning \u00a0As part of the Information Security measures,\u00a0ALL\u00a0new servers must pass an Information Security Scanning process\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology Office - Hong Kong Metropolitan University\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-12T07:15:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-43.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security Scanning - Information Technology Office - Hong Kong Metropolitan University","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Scanning","og_description":"About Information Security Scanning \u00a0As part of the Information Security measures,\u00a0ALL\u00a0new servers must pass an Information Security Scanning process","og_url":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","og_site_name":"Information Technology Office - Hong Kong Metropolitan University","article_modified_time":"2021-08-12T07:15:02+00:00","og_image":[{"url":"https:\/\/www.hkmu.edu.hk\/itu\/wp-content\/uploads\/sites\/2\/2021\/05\/image-43.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","url":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/","name":"Information Security Scanning - Information Technology Office - Hong Kong Metropolitan University","isPartOf":{"@id":"https:\/\/www.hkmu.edu.hk\/ito\/#website"},"datePublished":"2021-05-13T10:10:28+00:00","dateModified":"2021-08-12T07:15:02+00:00","breadcrumb":{"@id":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/information-security-scanning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Information Technology Office","item":"\/ito\/"},{"@type":"ListItem","position":2,"name":"Staff Services","item":"https:\/\/www.hkmu.edu.hk\/ito\/staff-services\/"},{"@type":"ListItem","position":3,"name":"Information Security Scanning"}]},{"@type":"WebSite","@id":"https:\/\/www.hkmu.edu.hk\/ito\/#website","url":"https:\/\/www.hkmu.edu.hk\/ito\/","name":"Information Technology Office - Hong Kong Metropolitan University","description":"Information Technology Office - Hong Kong Metropolitan University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hkmu.edu.hk\/ito\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268"}],"collection":[{"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":4,"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268\/revisions"}],"predecessor-version":[{"id":11752,"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/268\/revisions\/11752"}],"up":[{"embeddable":true,"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/pages\/224"}],"wp:attachment":[{"href":"https:\/\/www.hkmu.edu.hk\/ito\/wp-json\/wp\/v2\/media?parent=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}