Difference between revisions of "SUNScholar/Audit/Section 5"
Jump to navigation
Jump to search
| Line 6: | Line 6: | ||
===Guidelines=== | ===Guidelines=== | ||
**http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | **http://wiki.lib.sun.ac.za/index.php/SUNScholar/Guidelines/Step_5 | ||
| − | |||
===[[SUNScholar/Firewall|Firewall]]=== | ===[[SUNScholar/Firewall|Firewall]]=== | ||
===[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]=== | ===[[SUNScholar/Secure Internet Connections|Secure Internet Connections]]=== | ||
'''[[SUNScholar/Audit|Back to Audit]]''' | '''[[SUNScholar/Audit|Back to Audit]]''' | ||
Revision as of 12:22, 18 October 2013
Security
Security of the repository must be ensured for the following reasons:
- The vital digital research outputs must be secured from a system disaster.
- The repository must be secured from intrusion via the internet by unauthorised persons.
- The connection to the repository via the internet must be secured to protect the usernames and passwords of repository users.
Guidelines
Firewall
Secure Internet Connections
Back to Audit