In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Website Security Guidelines
To view the contents of this post, you must be authenticated and have the required access level.
Guidelines for personal computers & equipment
To view the contents of this post, you must be authenticated and have the required access level.
NUS Data Management Policy(DMP)
To view the contents of this post, you must be authenticated and have the required access level.
SAP-Oracle 12c Database Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
Software term of use
To view the contents of this post, you must be authenticated and have the required access level.
Software Audit Circular
To view the contents of this post, you must be authenticated and have the required access level.
Software Management Policy
To view the contents of this post, you must be authenticated and have the required access level.
NUS Cloud Policy
To view the contents of this post, you must be authenticated and have the required access level.
NUS DMP Appendices
To view the contents of this post, you must be authenticated and have the required access level.