Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
| Line 6: | Line 6: | ||
===Guidelines=== | ===Guidelines=== | ||
http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | ||
| + | ===[[SUNScholar/Disaster Recovery|Disaster Recovery]]=== | ||
===[[SUNScholar/Firewall|Firewall]]=== | ===[[SUNScholar/Firewall|Firewall]]=== | ||
===[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]=== | ===[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]=== | ||
'''[[SUNScholar/Audit|Back to Audit]]''' | '''[[SUNScholar/Audit|Back to Audit]]''' | ||
Revision as of 12:51, 17 December 2013
Contents
Security
Security of the repository must be ensured for the following reasons:
- The vital digital research outputs must be secured from a system disaster.
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
Guidelines
http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5
Disaster Recovery
Firewall
Secure Internet Connections
Back to Audit