Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
| Line 3: | Line 3: | ||
*The repository must be secured from intrusion via the internet by unauthorised persons. | *The repository must be secured from intrusion via the internet by unauthorised persons. | ||
*The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | *The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users. | ||
| − | + | ;Guidelines | |
| + | **http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | ||
;[[SUNScholar/Disaster Recovery|Disaster Recovery]] | ;[[SUNScholar/Disaster Recovery|Disaster Recovery]] | ||
;[[SUNScholar/Firewall|Firewall]] | ;[[SUNScholar/Firewall|Firewall]] | ||
;[[SUNScholar/Secure Internet Connections|Secure Internet Connections]] | ;[[SUNScholar/Secure Internet Connections|Secure Internet Connections]] | ||
Revision as of 20:59, 21 October 2012
Security of the repository must be ensured for the following reasons:
- The vital digital research outputs must be secured from a system disaster
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
- Guidelines