The processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction
Questions tagged [security]
170 questions
15
votes
4 answers
What simple, effective techniques for obfuscating points are available?
We are creating a website that will collect location information (points) from users. We are exploring techniques to preserve users' location privacy (e.g., often users will share their home address, which is sensitive). One option that came to mind…
Reid
- 602
- 4
- 15
10
votes
6 answers
How to handle sensitive geographic data?
You use sensitive geographic data every day. What are your strategies to protect them in your geographical information systems?
What kind of architecture do you use?
What encryption method do you use?
What do you do for users who export sensitive…
gistack.ca
- 111
- 4
4
votes
0 answers
Access control for SaaS-based GIS, which is the right way to go?
I'm currently researching on some access control models for SaaS-based GIS, and in the future would like to implement one. The common use cases would be like: some of the services, resources, layers, features, areas on map, etc. will be accessible…
mfdev
- 1,948
- 1
- 12
- 19
2
votes
1 answer
Access Control List for web GIS
I need to implement Access Control List (ACL) for my web application and I need to know common practice of using permissions in GIS systems. What levels of acces exists: layer, feature, attribute, extent, maybe anything else? What types of…
drnextgis
- 6,938
- 2
- 29
- 49
0
votes
4 answers
What GIS applications and services have been affected by the Heartbleed vulnerability?
Heartbleed is the name given to a recent, very severe security vulnerability in the OpenSSL library, used in a large number of websites and applications. It is being called one of the worst computer security vulnerabilities in recent history. Even…
blah238
- 35,793
- 7
- 94
- 195