Lesson 8: Information Security
From wiki.gis.com
This chapter provides an introduction to the purpose and scope of information security. Basic concepts are introduced for developing security solutions that meet your business needs. Esri's information patterns share how to establish security measures appropriate for your organization.
Contents
Video1: Information Security basics 38:26
Reference documentation
- What is information security?
- Esri security strategy evolution
- ArcGIS Server: Authorization deployment scenarios
- Portal: Authentication deployment scenarios
- ArcGIS Online security authentication and authorization
- Portal for ArcGIS security authentication and authorization
- Portal distributed collaboration
- Esri’s security strategy
Video2: System availability configuration strategies 17:58
Reference documentation
Security strategy overview
Security is everybody's job, there is no exception. The world is not a secure environment, and you need to keep your eyes and minds open to the threats around you.
There is no single solution for security.
- There are costs and trade-offs that must be made to support an optimum solution.
- Too much security controls can reduce productivity and increase cost.
- Too little attention and control can result in loss of property and the ability to perform.
Note: There is no CPT exercise for this lesson.
Best practice: Questions on SADSwiki content can be answered through the GeoNet Implementing GIS Architecture and Security forum.
Specific license terms for this content
System Design Strategies 26th Edition - An Esri ® Technical Reference Document • 2009 (final PDF release)