Objekty voľne dostupné (Creative Commons, Public Domain)
Stálý URI pro tuto komunituhdl:1234/16
Procházet
2 výsledky
Search Results
Záznam Digitálny repozitár ako terč kybernetického útoku(Ikaros, 2017) Formanek, Matúš; Zaborsky, MartinThis paper points out selected general security issues of digital repositories and some known means of cyber attacks initiated against them within the global network. In the theoretical introduction, the authors rely on expert studies and articles drawn to the established topic. By means of the case study method in particular academic environment and their own experience gained in dealing with security incident in the digital library environment running the Invenio system, authors describe the important aspects of a critical migration of the system from one server to another. In this process, it is necessary to ensure the transfer of digital library objects and metadata related to them. At the end, the paper provides professional public incentives and motives for creating disaster recovery plan, in case their digital library does not have any yet.Záznam Web Interface Security Vulnerabilities of European Academic Repositories(LIBER Quarterly, 2017-02-24) Formanek, Matúš; Zaborsky, MartinThe given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.