GIS System Security |
With the development of information technology, information security becomes more and more important and severe, and the wide application of service-oriented GIS makes GIS service security get more attention. The application is more from the single machine to the network application, and the realization of GIS function is more from the client to the server, from the two-dimensional GIS to the two-dimensional and three-dimensional integrated GIS, The security of Service GIS software products and data in 3D service is becoming more and more important. How to protect the security of GIS server, protect the security of GIS service content, ensure the normal operation of GIS service, and become a service-oriented GIS must solve the problem.
A GIS server generally contains one or more spatial databases, which store massive geographic data. Once the data is leaked or destroyed, it will have a very serious impact. Therefore, ensuring the reliability and security of GIS server data is particularly important. In addition, the existing service-oriented GIS has been able to meet the needs of different users for different data and different services. In the face of such differentiated application needs, service security should also be achieved for different users. GIS services have different access rights, that is, to implement access control for users to prevent unauthorized or unauthorized use of GIS services.
In addition, the GIS system is generally composed of multiple parts from the server to the client, and its security issue is not to control the security of a certain software. Considering the security of GIS system, we should also start from the overall perspective to ensure that Each part of the GIS system shares a set of unified and mutually compatible security scheme. This is the main security strategy of SuperMap GIS system.