基于GIS的礦山信息系統(tǒng)數據安全研究
發(fā)布時間:2018-10-09 11:02
【摘要】:基于GIS的礦山信息管理系統(tǒng)應用日益廣泛,由于網絡的開放性、用戶成分的復雜性、數據的敏感性、空間數據與屬性數據的關聯性等諸多因素,系統(tǒng)及數據的安全性面臨嚴峻挑戰(zhàn)。 本文在礦山信息系統(tǒng)的基礎上,論述影響系統(tǒng)及數據安全的主要因素,從內部威脅和外部威脅兩個方面分析了具體的安全威脅類型。提出了系統(tǒng)與數據的安全目標,分析了系統(tǒng)及數據的安全需求,設計了系統(tǒng)安全策略,主要包括管理體系、物理安全、應用系統(tǒng)安全、數據庫安全四方面。在管理體系方面設計了遵循多人負責原則、任期有限原則、職責分離的原則,在安全技術方面采用注冊碼軟件保護技術、身份認證和訪問控制技術、數據加密、數據一致性控制、安全審計與日志追蹤、數據庫備份與還原技術,其中訪問控制技術采用了較為靈活的基于角色訪問控制模型,保證數據一致性采用了版本控制、輸入檢查機制、關聯表同步修改等多種方法,安全審計與日志追蹤結合文檔和數據庫對日志文件進行存儲,保證日志信息的完整準確。最后,基于本文設計的安全策略,以支家地礦山管理信息系統(tǒng)為應用實例,進行了相應策略的實現。圖25幅,表19個,參考文獻64篇。
[Abstract]:The mine information management system based on GIS is widely used. Because of the openness of network, the complexity of user composition, the sensitivity of data, the correlation between spatial data and attribute data, etc. The security of system and data faces severe challenge. Based on the mine information system, this paper discusses the main factors that affect the security of the system and data, and analyzes the specific types of security threats from two aspects: internal threat and external threat. The security target of system and data is put forward, the security requirement of system and data is analyzed, and the system security strategy is designed, which includes four aspects: management system, physical security, application system security and database security. In the aspect of management system, we have designed to follow the principle of multi-person responsibility, the principle of limited tenure, the principle of separation of duties, the adoption of registration code software protection technology, identity authentication and access control technology, data encryption in the aspect of security technology. Data consistency control, security audit and log tracking, database backup and restore technology, access control technology adopted a more flexible role-based access control model, to ensure data consistency using version control, In order to ensure the integrity and accuracy of log information, many methods such as input checking mechanism, synchronous modification of associated tables, and so on, are used to store log files by combining security audit and log tracking with documents and databases to ensure the integrity and accuracy of log information. Finally, based on the security strategy designed in this paper, taking the management information system of Jijia mine as an application example, the corresponding strategy is implemented. There are 25 pictures, 19 tables and 64 references.
【學位授予單位】:中南大學
【學位級別】:碩士
【學位授予年份】:2013
【分類號】:TD67;P208
本文編號:2259092
[Abstract]:The mine information management system based on GIS is widely used. Because of the openness of network, the complexity of user composition, the sensitivity of data, the correlation between spatial data and attribute data, etc. The security of system and data faces severe challenge. Based on the mine information system, this paper discusses the main factors that affect the security of the system and data, and analyzes the specific types of security threats from two aspects: internal threat and external threat. The security target of system and data is put forward, the security requirement of system and data is analyzed, and the system security strategy is designed, which includes four aspects: management system, physical security, application system security and database security. In the aspect of management system, we have designed to follow the principle of multi-person responsibility, the principle of limited tenure, the principle of separation of duties, the adoption of registration code software protection technology, identity authentication and access control technology, data encryption in the aspect of security technology. Data consistency control, security audit and log tracking, database backup and restore technology, access control technology adopted a more flexible role-based access control model, to ensure data consistency using version control, In order to ensure the integrity and accuracy of log information, many methods such as input checking mechanism, synchronous modification of associated tables, and so on, are used to store log files by combining security audit and log tracking with documents and databases to ensure the integrity and accuracy of log information. Finally, based on the security strategy designed in this paper, taking the management information system of Jijia mine as an application example, the corresponding strategy is implemented. There are 25 pictures, 19 tables and 64 references.
【學位授予單位】:中南大學
【學位級別】:碩士
【學位授予年份】:2013
【分類號】:TD67;P208
【參考文獻】
相關期刊論文 前10條
1 汪劍;郭朗;;分布式遠程教育數據庫系統(tǒng)的設計與實現[J];成都大學學報(自然科學版);2009年04期
2 胡祺;王芙蓉;郭丙軒;柯俊;王鐵程;;地理空間數據安全技術研究與實現[J];測繪信息與工程;2011年04期
3 趙潔;基于組件的Web管理信息系統(tǒng)數據安全性策略[J];電腦知識與技術;2005年29期
4 陳珉,喻丹丹,涂國慶;分布式數據庫系統(tǒng)中數據一致性維護方法研究[J];國防科技大學學報;2002年03期
5 許勝平;沈玲;;信息管理系統(tǒng)安全設計與應用[J];城鎮(zhèn)供水;2003年03期
6 余莉;何隆華;;基于ArcSDE的礦產數據庫管理系統(tǒng)開發(fā)[J];計算機應用;2009年S2期
7 朱秀麗;苗作華;;基于ArcGIS的基礎地理空間數據庫系統(tǒng)設計[J];山西建筑;2009年06期
8 周定輝;王樹海;李曉玲;趙雪磊;陸小輝;熊靜;王玲;焦大志;;基于Oracle和ArcSDE的遼寧省森林資源數據庫的設計與構建[J];內蒙古林業(yè)調查設計;2008年02期
9 管麗娟;;基于MD5的軟件注冊碼的設計與實現[J];計算機應用與軟件;2013年01期
10 楊仁華;劉培玉;;基于日志的安全審計系統(tǒng)研究與實現[J];信息技術與信息化;2009年04期
,本文編號:2259092
本文鏈接:http://www.sikaile.net/kejilunwen/dizhicehuilunwen/2259092.html
最近更新
教材專著