The study of incident response in Taiwan
碩士 === 國立中山大學 === 資訊管理學系研究所 === 91 === Due to the enlargement of the use of Internet, computers are no longer separated systems. On the contrary, the frequency of sharing between computers’ computing abilities, devices, and resources is surprisingly high in the last few decades. This situation make...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/13954385859247200712 |
id |
ndltd-TW-091NSYS5396001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091NSYS53960012016-06-22T04:20:46Z http://ndltd.ncl.edu.tw/handle/13954385859247200712 The study of incident response in Taiwan 台灣網路事件回報之研究 Bon-Yen Liaw 廖邦彥 碩士 國立中山大學 資訊管理學系研究所 91 Due to the enlargement of the use of Internet, computers are no longer separated systems. On the contrary, the frequency of sharing between computers’ computing abilities, devices, and resources is surprisingly high in the last few decades. This situation makes people have a more convenient network situation. However, dangers also come along. Ever since the event occurred in 1988, the first computer worm (Morris Worm) makes people be aware of this issue. The computer network world has becoming an environment contains many potential dangers. Whereas the computer security incidents are increasing dramatically, many countries have established some specific organizations to solve these problems. TWCERT/CC (Taiwan Computer Emergency Response Team/ Coordination Center) is one of these organizations. The utilities of TWCERT/CC are to help people be aware of computer network dangers, to make responses and coordinate the security incidents inside and outside Taiwan, and to supervise the security circumstances in Taiwan and to announce alerts or take proper actions when the situation is serious. Responding and coordinating those incidents in TWCERT/CC is one crucial everyday job which requires a very complicated procedure. However, without a systematic method to handle the security incidents would be a heavy load for a computer security incident response team. This research is to develop a systematic method and procedure to handle incident and a system can implement this procedure. The goal is to shorten the processing time of incidents and enhance the accuracy of handling incidents, and to analyze the data collected from the system to get useful information. none 陳嘉玫 2002 學位論文 ; thesis 55 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊管理學系研究所 === 91 === Due to the enlargement of the use of Internet, computers are no longer separated systems. On the contrary, the frequency of sharing between computers’ computing abilities, devices, and resources is surprisingly high in the last few decades. This situation makes people have a more convenient network situation. However, dangers also come along. Ever since the event occurred in 1988, the first computer worm (Morris Worm) makes people be aware of this issue. The computer network world has becoming an environment contains many potential dangers. Whereas the computer security incidents are increasing dramatically, many countries have established some specific organizations to solve these problems.
TWCERT/CC (Taiwan Computer Emergency Response Team/ Coordination Center) is one of these organizations. The utilities of TWCERT/CC are to help people be aware of computer network dangers, to make responses and coordinate the security incidents inside and outside Taiwan, and to supervise the security circumstances in Taiwan and to announce alerts or take proper actions when the situation is serious.
Responding and coordinating those incidents in TWCERT/CC is one crucial everyday job which requires a very complicated procedure. However, without a systematic method to handle the security incidents would be a heavy load for a computer security incident response team. This research is to develop a systematic method and procedure to handle incident and a system can implement this procedure. The goal is to shorten the processing time of incidents and enhance the accuracy of handling incidents, and to analyze the data collected from the system to get useful information.
|
author2 |
none |
author_facet |
none Bon-Yen Liaw 廖邦彥 |
author |
Bon-Yen Liaw 廖邦彥 |
spellingShingle |
Bon-Yen Liaw 廖邦彥 The study of incident response in Taiwan |
author_sort |
Bon-Yen Liaw |
title |
The study of incident response in Taiwan |
title_short |
The study of incident response in Taiwan |
title_full |
The study of incident response in Taiwan |
title_fullStr |
The study of incident response in Taiwan |
title_full_unstemmed |
The study of incident response in Taiwan |
title_sort |
study of incident response in taiwan |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/13954385859247200712 |
work_keys_str_mv |
AT bonyenliaw thestudyofincidentresponseintaiwan AT liàobāngyàn thestudyofincidentresponseintaiwan AT bonyenliaw táiwānwǎnglùshìjiànhuíbàozhīyánjiū AT liàobāngyàn táiwānwǎnglùshìjiànhuíbàozhīyánjiū AT bonyenliaw studyofincidentresponseintaiwan AT liàobāngyàn studyofincidentresponseintaiwan |
_version_ |
1718318468818796544 |