English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109953/140892 (78%)
Visitors : 46224810      Online Users : 665
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/113415


    Title: 非營利單位資訊災難備援機制建置之雛形研究
    Authors: 謝昆霖
    呂易儒
    郭俊賢
    林俊男
    石琢暐
    Keywords: 重疊網路;分散式阻斷服務攻擊;監測系統
    Information Security Management Recovery Mechanism BS7799
    Date: 2005
    Issue Date: 2017-10-05 17:17:19 (UTC+8)
    Abstract: 隨著近年來資訊科技的發展,導入資訊技術以提昇組織效率與競爭力已經是全球的趨勢。而在近年來全球資訊安全事件不斷發生,資訊犯罪手法不翻新,為保護組織內部資訊相關資產並保持組織持續運作,導入資訊安全管理系統(Information Security Management System ,簡稱ISMS)便是一套可有效控制管理之方法。國際間建構資訊安全管理系統通常採用BS7799 與ISO/IEC17799 資訊安全管理規範為標準,以此標準來管理組織內部資訊的運用、資訊硬體的安全以及資訊使用者的控管,以達成資訊資產的「機密性」、「完整性」及「可用性」。本研究以個案研究方式,對一正以BS7799 標準導入資訊安全管理系統之非營利機構進行訪談與實地觀察,探討其組織特質及資訊安全管理政策,並以該個案為參考來適切地規劃一個非營利機構的資訊回復及災難備援機制。
    Applying information technology to promote the organization efficiency and competitiveness will be the development trend in recent years. Information Security Management System (ISMS) had been known as a way to keep and protect the stable and continuous operation of the information assets for most organizations. BS7799 and ISO/IEC17799 will be the international standard frequently used to construct the information security management security for most organizations. Applying BS7799 and ISO/IEC17799 to manage the application of information, the safety of hardware and the right of users will reach “Confidentiality”, “Integrity” and “Availability” of information assets. This research uses case study technique to investigate a nonprofit organization which applying the ISMS based on BS7799 standard. The ISMS will be initially discussed, and the information recovery mechanism process will be then constructed in this study. The information assets can be protected, built and recovery at the shortest time by using the constructed information recovery mechanism process when information security events happen.
    Relation: TANET 2005 台灣網際網路研討會論文集
    網路安全
    Data Type: conference
    Appears in Collections:[TANET 台灣網際網路研討會] 會議論文

    Files in This Item:

    File Description SizeFormat
    335.pdf559KbAdobe PDF2417View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback