|
Security |
-
A reliable and secure OS is the base of security. We
will use a hardened version of Linux which is already
known for this.
- All remote accesses to the system will
be encrypted and authentified via SSH and HTTPS to avoid
risks of snooping on the network for passwords.
- A smart card
reader will allow the use of smart cards to
hold encryption keys, or lock local accesses to the
system.
|
|
|