IT Services Secure IT Cybersecurity
Cybersecurity
- Aboriginals and Torres Strait Islanders in Marine Science
- Courses
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Reputation and Experience
- Celebrating 50 Years
- Academy
- Anthropological Laboratory for Tropical Audiovisual Research (ALTAR)
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre
- Living on Campus
- Advanced Analytical Centre
- Applying to JCU
- Alumni
- AMHHEC
- JCU Aquaculture Solutions
- AusAsian Mental Health Research Group
- ARCSTA
- Area 61
- Association of Australian University Secretaries
- Australian/NZ Students
- Australian Lions Stinger Research
- Australian Tropical Herbarium
- Australian Quantum & Classical Transport Physics Group
- Boating and Diving
- JCU-CSIRO Partnership
- Employability Edge
- Career Ready Plan
- CASE
- Careers at JCU
- Careers and Employability
- Chancellery
- Centre for Tropical Bioinformatics and Molecular Biology
- CITBA
- CMT
- College of Business, Law and Governance
- College of Healthcare Sciences
- WHOCC for N&M Education and Research
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- Centre for Disaster Solutions
- CSTFA
- Cyber Security Hub
- Cyclone Testing Station
- The Centre for Disaster Studies
- Daintree Rainforest Observatory
- Discover Nature at JCU
- Research Division
- Services and Resources Division
- Education Division
- Economic Geology Research Centre
- Elite Athletes
- eResearch
- Environmental Research Complex [ERC]
- Estate
- Fletcherview
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- General Practice and Rural Medicine
- GetReady4Uni
- Give to JCU
- Governance
- Information for JCU Cairns Graduates
- Art of Academic Writing
- Art of Academic Editing
- Graduate Research School
- Graduation
- Indigenous Education and Research Centre
- Indigenous Engagement
- Indigenous Legal Needs Project
- Inherent Requirements
- IsoTropics Geochemistry Lab
-
IT Services
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
-
Secure IT
- Choosing a strong Password
- Cybersecurity
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- Multi-Factor Authentication (MFA)
- Student Systems
- IT Service Catalog
- About
- International Schools
- International Students
- Research and Innovation Services
- JCU Eduquarium
- JCU Events
- JCU Global Experience
- JCU Ideas Lab
- JCU Job Ready
- JCU Motorsports
- JCU Prizes
- JCU Sport
- JCU Turtle Health Research
- Language and Culture Research Centre
- CEE
- LearnJCU
- Library
- Mabo Decision: 30 years on
- MARF
- Marine Geophysics Laboratory
- New students
- Off-Campus Students
- Office of the Vice Chancellor and President
- Virtual Open Day
- Orpheus
- Outstanding Alumni
- Parents and Partners
- Pathways to university
- Planning for your future
- Placements
- Policy
- PAHL
- Publications
- Professional Experience Placement
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- RDIM
- Researcher Development Portal
- Safety and Wellbeing
- Scholarships
- Contextual Science for Tropical Coastal Ecosystems
- Staff
- State of the Tropics
- Strategic Procurement
- Student Equity and Wellbeing
- Student profiles
- SWIRLnet
- TARL
- TESS
- TREAD
- TropEco for Staff and Students
- TQ Maths Hub
- TUDLab
- Unicare Centre and Unicampus Kids
- UAV
- VAVS Home
- Work Health and Safety
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
- Clinical Psychedelic Research Lab
Cybersecurity relates to the activity or process, ability or capability, or state whereby information and communications systems and the information contained within are protected from and/or defended against damage, unauthorised use or modification, or exploitation to the protection of information and the systems that use, store, and transmit that information.
Our daily life, economic strength, and national security depend on a stable and resilient cyberspace. We rely on a vast array of networks to communicate and travel, power our homes, run our economy, and provide government services.
Cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on both organisations and the economy.
Combating cyber threats is a shared responsibility. Staff, students, partners and visitors all have an important role to play.
Purpose of Cybersecurity
JCU’s business, research and operation depend on the efficient functioning of its ICT systems and our learning management, finance and people management (HR) systems along with many more, are of strategic importance to the mission of the University.
It is important to also observe that the hardware, software, data and information components that constitute JCU’s ICT infrastructure, sites and services represent a sizeable financial commitment that must also be protected.
A visible and effective Cyber Security Program will provide confidence to stakeholders that JCU is adequately managing cyber threats and also provide a strong foundation from which the University can engage in the digital economy. The foundation principles of the JCU Cyber Security Program are:
Confidentiality: the restriction of access to information by authorised persons, entities and processes at authorised times and in an authorised manner.
Integrity: safeguarding the accuracy and completeness of information and information processing systems.
Availability: ensuring that authorised users have access to information and associated assets when required.
Cybersecurity Programs
ICT operate a number of Cybersecurity Programs for JCU. Some of the key initiatives include:
Risk Management
Policy and Procedure Development
General Security Awareness and Training
Security Consultation
If you would like more information, or to participate in any of the above programs, please Contact Us on the details below.
Responsibility, Consultation and Improvement
While ICT is responsible for coordinating Cybersecurity activities, it must be remembered that ALL JCU Staff, Students and Visitors are responsible for making a positive contribution to the appropriate use of computing resources and ensuring that the JCU Information Security Policy remains effective.
The Cyber Security Team can assist all areas of the University in implementing the JCU Information Security Policy and ensuring the appropriate application of the Policy itself. Some of the common areas we provide consultation include:
Compliance – Performance of compliance assessments and programs to assess an area/function/system against the requirements of policies, standards, principles and codes of practice.
Requirements – Providing detailed security requirements for new projects or initiatives.
Risk Management – Facilitation of risk workshops (based on ISO 31000) to assess risk exposures recommendations for the implementation of controls.
Personnel Training – Training of personnel to ensure all staff are aware of their security responsibilities.
For further information about Cybersecurity Consultation or if you have an idea on how to improve our security processes, please send an email to cyber.security@jcu.edu.au
Reporting Cybersecurity Incidents
Managing ICT incidents (including cybersecurity incidents) is a core function of ICT. JCU ICT considers a security incident as an event, which compromises or could compromise the Confidentiality, Integrity and Availability of information and/or information systems.
Examples of cybersecurity incidents include:
Unauthorised access to information and information systems;
Attempted or successful System intrusion and virus outbreaks;
Suspicious, fraudulent, inappropriate or offensive email; and
Theft of hardware, documents, storage media, etc.
All security incidents and security weaknesses that may affect the reputation of JCU, compromise information and/or information systems, must be reported to the IT Help Desk.
Reference Material
For related JCU Policies and Procedures, please refer to:
JCU Polices
JCU Guidelines
- JCU ICT Account and Security Guidelines
- JCU ICT Email Spam and Attachments Guide
- JCU ICT Computer Virus Guideline
- JCU ICT Changing Your Password Guideline
- JCU ICT Computer Room Conditions of Use
External Documents
- Queensland Government Information Security Classification Framework (QGISCF)
- QLD information Security Standard - IS 18
Communications
The following communication channels are in use:
- JCU Yammer (JCU Staff can access using their O365 Login)
- ICT Communications Hub (JCU Staff can access using their O365 Login)
- Student Bulletins
External References
For additional information on good security practices, refer to:
Contact ICT Cybersecurity
For further information about Cybersecurity please send an email to cyber.security@jcu.edu.au