Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
| Line 4: | Line 4: | ||
#The repository must be secured from intrusion via the internet by unauthorised persons. | #The repository must be secured from intrusion via the internet by unauthorised persons. | ||
#The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | #The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | ||
| − | + | ===Guidelines=== | |
**http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | **http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | ||
| − | + | ===[[SUNScholar/Disaster Recovery|Disaster Recovery]]=== | |
| − | + | ===[[SUNScholar/Firewall|Firewall]]=== | |
| − | + | ===[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]=== | |
'''[[SUNScholar/Audit|Back to Audit]]''' | '''[[SUNScholar/Audit|Back to Audit]]''' | ||
Revision as of 16:36, 6 March 2013
Contents
Security
Security of the repository must be ensured for the following reasons:
- The vital digital research outputs must be secured from a system disaster.
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
Guidelines
Disaster Recovery
Firewall
Secure Internet Connections
Back to Audit