You and Your CourseOpportunities
Research and Teaching
Our ResearchResearch Degrees
Partners and Community
Partner with JCU
- About JCUPartner with JCU
- Careers and Employability
- College of Arts, Society and Education
- College of Healthcare Sciences
- College of Medicine and Dentistry
- Division of Tropical Environments and Societies
- International Students
- JCU Eduquarium
- Open Day
- Parents and Partners
- Pathways to University
- JCU Connect
- Scholarships @ JCU
- Media & Comms
- Australian Institute of Tropical Health & Medicine
- About JCU
Help and Support
- Accounts and passwords
- Bring your own device
- Computer labs
- Eduroam WiFi
- Email and O365
- IT Help Desk
- Collaboration Tools
- Mobiles and telephony
- Secure IT
- Videoconferencing and audiovisual
Work from home
- Choosing a strong Password
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- ICT Service Catalog
Cybersecurity relates to the activity or process, ability or capability, or state whereby information and communications systems and the information contained within are protected from and/or defended against damage, unauthorised use or modification, or exploitation to the protection of information and the systems that use, store, and transmit that information.
Our daily life, economic strength, and national security depend on a stable and resilient cyberspace. We rely on a vast array of networks to communicate and travel, power our homes, run our economy, and provide government services.
Cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on both organisations and the economy.
Combating cyber threats is a shared responsibility. Staff, students, partners and visitors all have an important role to play.
Purpose of Cybersecurity
JCU’s business, research and operation depend on the efficient functioning of its ICT systems and our learning management, finance and people management (HR) systems along with many more, are of strategic importance to the mission of the University.
It is important to also observe that the hardware, software, data and information components that constitute JCU’s ICT infrastructure, sites and services represent a sizeable financial commitment that must also be protected.
A visible and effective Cyber Security Program will provide confidence to stakeholders that JCU is adequately managing cyber threats and also provide a strong foundation from which the University can engage in the digital economy. The foundation principles of the JCU Cyber Security Program are:
Confidentiality: the restriction of access to information by authorised persons, entities and processes at authorised times and in an authorised manner.
Integrity: safeguarding the accuracy and completeness of information and information processing systems.
Availability: ensuring that authorised users have access to information and associated assets when required.
ICT operate a number of Cybersecurity Programs for JCU. Some of the key initiatives include:
Policy and Procedure Development
General Security Awareness and Training
If you would like more information, or to participate in any of the above programs, please Contact Us on the details below.
Responsibility, Consultation and Improvement
While ICT is responsible for coordinating Cybersecurity activities, it must be remembered that ALL JCU Staff, Students and Visitors are responsible for making a positive contribution to the appropriate use of computing resources and ensuring that the JCU Information Security Policy remains effective.
The Cyber Security Team can assist all areas of the University in implementing the JCU Information Security Policy and ensuring the appropriate application of the Policy itself. Some of the common areas we provide consultation include:
Compliance – Performance of compliance assessments and programs to assess an area/function/system against the requirements of policies, standards, principles and codes of practice.
Requirements – Providing detailed security requirements for new projects or initiatives.
Risk Management – Facilitation of risk workshops (based on ISO 31000) to assess risk exposures recommendations for the implementation of controls.
Personnel Training – Training of personnel to ensure all staff are aware of their security responsibilities.
For further information about Cybersecurity Consultation or if you have an idea on how to improve our security processes, please send an email to email@example.com
Reporting Cybersecurity Incidents
Managing ICT incidents (including cybersecurity incidents) is a core function of ICT. JCU ICT considers a security incident as an event, which compromises or could compromise the Confidentiality, Integrity and Availability of information and/or information systems.
Examples of cybersecurity incidents include:
Unauthorised access to information and information systems;
Attempted or successful System intrusion and virus outbreaks;
Suspicious, fraudulent, inappropriate or offensive email; and
Theft of hardware, documents, storage media, etc.
All security incidents and security weaknesses that may affect the reputation of JCU, compromise information and/or information systems, must be reported to the IT Help Desk.
For related JCU Policies and Procedures, please refer to:
- JCU ICT Account and Security Guidelines
- JCU ICT Email Spam and Attachments Guide
- JCU ICT Computer Virus Guideline
- JCU ICT Changing Your Password Guideline
- JCU ICT GATCF LAB Conditions of Use
- Queensland Government Information Security Classification Framework (QGISCF)
- QLD information Security Standard - IS 18
The following communication channels are in use:
- JCU Yammer (JCU Staff can access using their O365 Login)
- ICT Communications Hub (JCU Staff can access using their O365 Login)
- Student Bulletins
For additional information on good security practices, refer to:
Contact ICT Cybersecurity
For further information about Cybersecurity please send an email to firstname.lastname@example.org
- James Cook University
- Bachelor of Advanced Science
- Bachelor of Arts
- Bachelor of Biomedical Sciences
- Bachelor of Business
- Bachelor of Business / Laws
- Bachelor of Business & Environmental Science
- Bachelor of Dental Surgery
- Bachelor of Early Childhood Education
- Bachelor of Primary Education
- Bachelor of Secondary Education
- Bachelor of Environmental Practice
- Bachelor of Geology
- Bachelor of Information Technology
- Bachelor of Laws
- Bachelor of Nursing Science (External)
- Bachelor of Midwifery
- Bachelor of Pharmacy
- Bachelor of Physiotherapy
- Bachelor of Planning
- Bachelor of Psychological Science
- Bachelor of Science
- Bachelor of Social Work
- Bachelor of Speech Pathology
- Bachelor of Sport & Exercise Science
- Bachelor of Veterinary Science
- Bachelor of Clinical Sciences (Honours)
- Bachelor of Engineering (Honours)
- Bachelor of Engineering / Science (Honours) MBA in Tourism
- Master of Public Health and Tropical Medicine
- Master of Data Science
- Bachelor of Sports Psychology
- Bachelor of Marine Science
- Bachelor of Medicine / Surgery
- Bachelor of Nursing Science [Pre-Registration]
- Bachelor of Medical Laboratory Science (Honours)
- Bachelor of Occupational Therapy (Honours)
- Bachelor of Psychology
- Master of Conflict Management & Resolution
- Graduate Certificate of Conflict Management & Resolution
- Master of Global Development
- Master of International Tourism & Hospitality Management
- Bachelor of Technology and Innovation
- Bachelor of Science & Bachelor of Laws
- Diploma of Higher Education
- Diploma of Higher Education (Business)
- Diploma of Higher Education Majoring in Business Studies
- Diploma of Higher Education Majoring in Engineering and Applied Science
- Diploma of Higher Education Majoring in General Studies
- Diploma of Higher Education Majoring in Health
- Diploma of Higher Education Majoring in Information Technology
- Diploma of Higher Education Majoring in Science
- Diploma of Higher Education, Majoring in Society and Culture