Difference between revisions of "SUNScholar/Audit/Section 5"

From Libopedia
Jump to navigation Jump to search
Line 3: Line 3:
 
*The repository must be secured from intrusion via the internet by unauthorised persons.
 
*The repository must be secured from intrusion via the internet by unauthorised persons.
 
*The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
 
*The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
 
+
;Guidelines
 +
**http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5
 
;[[SUNScholar/Disaster Recovery|Disaster Recovery]]
 
;[[SUNScholar/Disaster Recovery|Disaster Recovery]]
 
;[[SUNScholar/Firewall|Firewall]]
 
;[[SUNScholar/Firewall|Firewall]]
 
;[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]
 
;[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]

Revision as of 20:59, 21 October 2012

Security of the repository must be ensured for the following reasons:

  • The vital digital research outputs must be secured from a system disaster
  • The repository must be secured from intrusion via the internet by unauthorised persons.
  • The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
Guidelines
Disaster Recovery
Firewall
Secure Internet Connections