Skip to main content

IT Security

  • IT Security

    IT SECURITY

    "We are the first and last line of Cyberdefense"

    IT Security Department are responsible for plan, develop, manage, oversee policies, standards and procedures, testing and reporting security process in cohession of the maintainance of servers , databases , and internet to ensure the quality and secure them from any kind of internal and external threat from inside or outside of UTHM so that UTHM community can benefit from them efficiently and safely .

    "IT Security is everyone's responsibility"

    All of us are familiar with the prevention is better than cure saying, it is not our sole purpose to safeguard your valuable private data thus we would like to encourage all of you to take precaution steps in using devices and technologies in order to avoid any cyberattack that can occur to anyone.
  • IT Security

    IT Security Unit

    Firewall, Web Application Firewall, Intrusion Detection System (IDS), leased line, bandwidth management, DHCP, VPN, Penetration Testing and PROXY were administrated by IT Security Unit. This unit watches over UTHM web application from hacker together with managing the internet bandwidth and provides VPN services to carry out work remotely from network outside university. Annually IT Security unit carry out penetration testing and discuss the solutions for any vulnerability found.

    Center of Network Processing

    They monitor the network infrastructure, servers, databases, firewall, intrusion detection system, bandwidth management and internet. Based on those information, they provides analysis of security alerts generated by network hardware, server or application and notify the results of the analyze problems to the units involved i.e. problems with phishing emails and website defaced.

  • Organizational Chart

  • 1. How to apply Virtual Private Network (VPN)?

    • Applicants must apply it by official email to This email address is being protected from spambots. You need JavaScript enabled to view it. or meet directly with the ICT Security officer.
    • The application period is approved within 2 working days.

    2. How to request to open server port?

    • Applicant must apply it by letter or official email to This email address is being protected from spambots. You need JavaScript enabled to view it. or meet with ICT the Security officer.
    • Inform the justification of the necessity to open the server port.
    • The application period is approved within 2 working days.

    3. Why the sites are blocked?

    • Because it contains with elements of malware, gambling, fishing, pornography, peer to peer and piracy .

    4. How can I apply to allow blocked website?

    • The applicants need to apply by email and provide justification for access to the site.

    5. How to prepare the Public IP

    • Users need to apply it by letter or email to This email address is being protected from spambots. You need JavaScript enabled to view it. and send it to the Information Technology Officer.

    If you are facing this problem, you may contact Help Desk: +607 4537297 / +607 4537298.

    Thank you.