5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure

From CLOCKSS Trusted Digital Repository Documents
Jump to: navigation, search

5.1.1 - The repository shall identify and manage the risks to its preservation operations and goals associated with system infrastructure.

The Threat Model section of CLOCKSS: Threats and Mitigations sets out the threat model upon which the LOCKSS technology was based, which was published in D-Lib in 2005. The Mitigation Strategy section of CLOCKSS: Threats and Mitigations sets out the approach the LOCKSS technology uses to mitigate these threats, and the additional mitigations employed by the CLOCKSS archive.

Relevant Documents

  1. Requirements for Digital Preservation Systems: A Bottom-Up Approach
  2. CLOCKSS: Threats and Mitigations