Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
| Line 3: | Line 3: | ||
*The repository must be secured from intrusion via the internet by unauthorised persons. | *The repository must be secured from intrusion via the internet by unauthorised persons. | ||
*The connection to the repository via the internet must be secured to protect the usernames and password of repository users. | *The connection to the repository via the internet must be secured to protect the usernames and password of repository users. | ||
| + | |||
| + | ==[[SUNScholar/Disaster Recovery]]== | ||
| + | |||
'''[[SUNScholar/Audit|Back to Audit]]''' | '''[[SUNScholar/Audit|Back to Audit]]''' | ||
__NOTOC__ | __NOTOC__ | ||
Revision as of 14:49, 3 October 2012
Security of the repository must be ensured for the the following reasons:
- The vital digital research outputs must be secured from a system disaster
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and password of repository users.
SUNScholar/Disaster Recovery
Back to Audit