Jump to the main content block

Home  Site Map  中文  NTUNHS



Information Security

    School of Science and Technology since August after renamed the Ministry of Education will be required for the school level to improve information security, so please pay attention to school colleagues, with the Ministry of Education in April and October each year the two universities on the e-mail social engineering exercise, the network Group is expected to advance 99 years 9 months to drill, then will send you some false or unknown but the theme is very attractive colleague Email email to your mailbox, please develop good habits, do not open them curious, if using Outlook Colleagues or Outlook Express, be sure to close the preview window, see the following content of propaganda.


Do not visit non-work-related or do not trust the Web site or e-mail Do not download and install unauthorized software
From time to time update the operating system and applications Patch Necessary protective software installed
Do not open suspicious letters or work-related attachments Any reference to ”emergency”or” personal finance ” to maintain skepticism
If there is any point of the letter concerns, do not click the hyperlink in email Do not fill out any email in the form of personal data
Enter credit card number on the site or personal data, must first confirm that the site is never really safe



「Why did I receive this message」 「Should I open this message」
     Sent from     Whether business or work needs
「Should I have received this e-mail」     Click the link does not open or whether it will affect
    Message subject     Assessment of acceptable risk
    Message content     Due diligence(Colleagues, information center)


 E-mail to cancel the preview function Read the message plain text mode
    To avoid the mistake to open a malicious e-mail      Contents of the letter to avoid execution of malicious
Turn off the automatic download mail photo Cancel the automatic transmission slip
    Prevention of malicious code with the picture of external    Gather information to prevent hackers


Sender's name or e-mail address E-mail subject and content
     Are there exceptions? Need to confirm the identity of the sender     With their work, whether the business-related
Web links, or whether the suspicious attachment file attachment URL instead of using unknown IP(ex.http://220.33.444.12/
    URL link within the message to determine abnormal     Check the attached file of the

  For the immediate-related e-mail, if contains threats, inducements, warnings,

Tips, and message content, and then act as first thought, you should consider the possibility of fraud

Malicious code attacks are often difficult to detect the file Common virus attachment file extension
With the recipient's daily work is related to  
Do not free to log on personal information sites on the unknown
E-mail management
Windows and the Office of the Pacth, anti-virus software and virus signatures to be updated frequently      District office and personal use of the mail
E-Mail Popular name of the account to avoid
Regular testing of the system
   Log out registered mail, easy to receive many junk e-mail, use caution      Regular security check
Do not reply to e-mail of unknown origin
Physical isolation
    Alert information should be isolated from the host operating entity