Security Guideline
SSL/TLS Protocols Security Guidelines
Introduction
SSL/TLS1 protocols are pervasive throughout information systems and the Internet. They protect the confidentiality of communication. HTTPS protocol is one of the more common applications that make use of SSL/TLS for encrypting communication between browsers and websites2. A typical...
Release Date: 3 Mar 2016
6781 Views
Personal Internet Service Account Security Management Guideline
To prevent your personal information stolen by hackers, account management is very important. Using a strong password can help to against brute force attack launched by hackers. However, nowadays, a strong password is not enough to protect your account from cyber criminals. HKCERT...
Release Date: 24 Feb 2016
5120 Views
Best Practice Guide (SSL Implementation) for Mobile App Development
Mobile platform is increasingly become a choice for delivering services. As more sensitive data and transaction data will be transported on mobile communication channels, the security risks associated with untrusted communication, such as public Wi-Fi have to be addressed, for example, fraudster can...
Release Date: 14 Sep 2015
5524 Views
Mobile Instant Messaging Security Guidelines
What is IM? IM (Instant Messaging) is a real-time communication system that allows two or more users to transfer text messages, files, voice and video via a network immediately. With the rise of smartphones, IM application turned from PC to...
Release Date: 31 Mar 2015
5910 Views
Near Field Communication Security Guidelines
Near Field Communication (NFC), the name often appears in smartphone. Many electronic devices such as speakers and Bluetooth headsets also support NFC communication. In fact, NFC technology has been used since 1997 in Hong Kong in a popular payment service – the Octopus.
Most...
Release Date: 31 Oct 2013
5106 Views
Bring Your Own Device (BYOD) Security Guidelines
What is BYOD? In the past, corporations purchase electronic devices, such as laptops and mobile phones, for staff worked outside of the office. Security of these electronic devices are centralized and managed by IT departments. In recent years, as the mobile devices...
Release Date: 26 Sep 2013
5673 Views
Guideline of Web Application Security Preventive Measures
Web application developer should take the below preventive measures to protect their web application. 10 Security Preventive Measures Follow HKCERT website for latest updates Ensure user use strong password and provide two-factor authentication Use web application firewall Restrict access and protect web admin...
Release Date: 9 Jul 2013
5453 Views
IPv6 Security Guideline for Business User
As IPv4 address allocation have already exhausted, IPv6 is the only solution to the shortage of IPv4 address. IPv6 adoption will grow for business user and it is expected both version of Internet Protocol will coexist on the Internet for some years. Therefore, business organizations...
Release Date: 30 May 2013
3738 Views
IPv6 Security Guideline for Home User
Current Internet Protocol version 6 (IPv6) situation in Hong Kong Everyone should be familiar with the term “IP address”. It is much like a delivery address on the Internet. IPv6 is the new generation Internet Protocol. As IPv4 address allocation have already exhausted...
Release Date: 29 May 2013
4291 Views
Guideline of Mobile Security
Now, more than ever, mobile device applications are getting more and more popular in our daily life. Mobile device applications is becoming a primarily communication channel for us to interact with business partners, family members and friends. Mobility brings us convenience, however, it...
Release Date: 28 Feb 2013
4161 Views