Session B: Information Systems and Data Warehouse
Martin Malík, Tomá Kamrád: Information systems Conception of University of Ostrava

9. The security policy

An essential and often omitted component in IS implementation is defining the security policy. At the University of Ostrava the security policy implementation is in progress in two levels.

During a particular IS installation the access rights for users are set, backup, data archiving and data transfer coding are ensured, there is a power supply backup, the security of a computer itself and OS is preferably treated.

After finishing the installation and implementation the IS is included into the other employed systems, which are protected against network attacks, possibly against attacks from the Internet and a periodical training of users for working with information deposited in databases, with access rights and passwords treatment etc. is going to proceed.



© This publication and its compilation in form and content is copyrighted. Every realization which is not explicitly allowed by copyright law requires a written agreement. Especially, this holds for reprography and processing / storing by electronic systems.

EUNIS Proceeding DTD Version 1.0
HTML - Version create: Fri Mar 23 15:30:43 2001