Font Size: a A A

Data Safety Research On Mine Information System Based On GIS

Posted on:2014-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:S Q ChenFull Text:PDF
GTID:2251330425473166Subject:Geography
Abstract/Summary:PDF Full Text Request
The application of mine information management system based on GIS becomes more and more extensive. Because of the openness of Internet, the complexity of the user component, data sensitivity, the relevance of spatial data and attribute data and other factors, the security of information system and data are facing severe challenges.On the basis of the mine information system, this paper discussed the main factors of affecting the system and data security, and analyzes specific type of security threats from two aspects of internal threats and external threats. Then propose the security objectives of the system and data, and analyzes the security requirements of the system and data, and design a system security policy, including the management system design, physical security design, application security design, and database security design. In management system, we designed the principle of multiple people responsible, the principle of limited duration, and the principle of separation of different duties. In the technology, registration code software protection technology, identity authentication and access control technology, data encryption, data consistency control, security audit and log tracking, and database backup and restore technology are applied. In which, a more flexible role-based access control technology is used in access control; version control, the input checking mechanism, the synchronization modifying of associated tables and other methods are used to ensuring data consistency; log information is stored in documents and databases to ensure its complete and accurate. Finally, the security policy we designed is realized in the application case of Zhijiadi mine management information system.
Keywords/Search Tags:Mine information management, data security, Role-basedaccess control, Log audit and tracking
PDF Full Text Request
Related items