Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
m |
m |
||
| Line 8: | Line 8: | ||
#The repository must be secured from intrusion via the internet by unauthorised persons. | #The repository must be secured from intrusion via the internet by unauthorised persons. | ||
#The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | #The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | ||
| − | + | ||
http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | ||
| − | + | ||
| − | + | *[[SUNScholar/Disaster Recovery|Disaster Recovery]] | |
| − | + | *[[SUNScholar/Firewall|Firewall]] | |
| + | *[[SUNScholar/Secure Internet Connections|Secure Internet Connections]] | ||
'''[[SUNScholar/Audit|Back to Audit]]''' | '''[[SUNScholar/Audit|Back to Audit]]''' | ||
Latest revision as of 14:46, 23 March 2014
Section 6
SECTION 5 - SECURITY
Security of the repository must be ensured for the following reasons:
- The vital digital research outputs must be secured from a system disaster.
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5
Back to Audit