基于GIS的矿山信息系统数据安全研究
发布时间:2018-10-09 11:02
【摘要】:基于GIS的矿山信息管理系统应用日益广泛,由于网络的开放性、用户成分的复杂性、数据的敏感性、空间数据与属性数据的关联性等诸多因素,系统及数据的安全性面临严峻挑战。 本文在矿山信息系统的基础上,论述影响系统及数据安全的主要因素,从内部威胁和外部威胁两个方面分析了具体的安全威胁类型。提出了系统与数据的安全目标,分析了系统及数据的安全需求,设计了系统安全策略,主要包括管理体系、物理安全、应用系统安全、数据库安全四方面。在管理体系方面设计了遵循多人负责原则、任期有限原则、职责分离的原则,在安全技术方面采用注册码软件保护技术、身份认证和访问控制技术、数据加密、数据一致性控制、安全审计与日志追踪、数据库备份与还原技术,其中访问控制技术采用了较为灵活的基于角色访问控制模型,保证数据一致性采用了版本控制、输入检查机制、关联表同步修改等多种方法,安全审计与日志追踪结合文档和数据库对日志文件进行存储,保证日志信息的完整准确。最后,基于本文设计的安全策略,以支家地矿山管理信息系统为应用实例,进行了相应策略的实现。图25幅,表19个,参考文献64篇。
[Abstract]:The mine information management system based on GIS is widely used. Because of the openness of network, the complexity of user composition, the sensitivity of data, the correlation between spatial data and attribute data, etc. The security of system and data faces severe challenge. Based on the mine information system, this paper discusses the main factors that affect the security of the system and data, and analyzes the specific types of security threats from two aspects: internal threat and external threat. The security target of system and data is put forward, the security requirement of system and data is analyzed, and the system security strategy is designed, which includes four aspects: management system, physical security, application system security and database security. In the aspect of management system, we have designed to follow the principle of multi-person responsibility, the principle of limited tenure, the principle of separation of duties, the adoption of registration code software protection technology, identity authentication and access control technology, data encryption in the aspect of security technology. Data consistency control, security audit and log tracking, database backup and restore technology, access control technology adopted a more flexible role-based access control model, to ensure data consistency using version control, In order to ensure the integrity and accuracy of log information, many methods such as input checking mechanism, synchronous modification of associated tables, and so on, are used to store log files by combining security audit and log tracking with documents and databases to ensure the integrity and accuracy of log information. Finally, based on the security strategy designed in this paper, taking the management information system of Jijia mine as an application example, the corresponding strategy is implemented. There are 25 pictures, 19 tables and 64 references.
【学位授予单位】:中南大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TD67;P208
本文编号:2259092
[Abstract]:The mine information management system based on GIS is widely used. Because of the openness of network, the complexity of user composition, the sensitivity of data, the correlation between spatial data and attribute data, etc. The security of system and data faces severe challenge. Based on the mine information system, this paper discusses the main factors that affect the security of the system and data, and analyzes the specific types of security threats from two aspects: internal threat and external threat. The security target of system and data is put forward, the security requirement of system and data is analyzed, and the system security strategy is designed, which includes four aspects: management system, physical security, application system security and database security. In the aspect of management system, we have designed to follow the principle of multi-person responsibility, the principle of limited tenure, the principle of separation of duties, the adoption of registration code software protection technology, identity authentication and access control technology, data encryption in the aspect of security technology. Data consistency control, security audit and log tracking, database backup and restore technology, access control technology adopted a more flexible role-based access control model, to ensure data consistency using version control, In order to ensure the integrity and accuracy of log information, many methods such as input checking mechanism, synchronous modification of associated tables, and so on, are used to store log files by combining security audit and log tracking with documents and databases to ensure the integrity and accuracy of log information. Finally, based on the security strategy designed in this paper, taking the management information system of Jijia mine as an application example, the corresponding strategy is implemented. There are 25 pictures, 19 tables and 64 references.
【学位授予单位】:中南大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TD67;P208
【参考文献】
相关期刊论文 前10条
1 汪剑;郭朗;;分布式远程教育数据库系统的设计与实现[J];成都大学学报(自然科学版);2009年04期
2 胡祺;王芙蓉;郭丙轩;柯俊;王铁程;;地理空间数据安全技术研究与实现[J];测绘信息与工程;2011年04期
3 赵洁;基于组件的Web管理信息系统数据安全性策略[J];电脑知识与技术;2005年29期
4 陈珉,喻丹丹,涂国庆;分布式数据库系统中数据一致性维护方法研究[J];国防科技大学学报;2002年03期
5 许胜平;沈玲;;信息管理系统安全设计与应用[J];城镇供水;2003年03期
6 余莉;何隆华;;基于ArcSDE的矿产数据库管理系统开发[J];计算机应用;2009年S2期
7 朱秀丽;苗作华;;基于ArcGIS的基础地理空间数据库系统设计[J];山西建筑;2009年06期
8 周定辉;王树海;李晓玲;赵雪磊;陆小辉;熊静;王玲;焦大志;;基于Oracle和ArcSDE的辽宁省森林资源数据库的设计与构建[J];内蒙古林业调查设计;2008年02期
9 管丽娟;;基于MD5的软件注册码的设计与实现[J];计算机应用与软件;2013年01期
10 杨仁华;刘培玉;;基于日志的安全审计系统研究与实现[J];信息技术与信息化;2009年04期
,本文编号:2259092
本文链接:https://www.wllwen.com/kejilunwen/dizhicehuilunwen/2259092.html