A field study on hacker invasion and defensive strategy of information security of ROC government

碩士 === 國立臺灣大學 === 商學研究所 === 94 === PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on infor...

Full description

Bibliographic Details
Main Authors: Ben-Shan Liu, 劉本善
Other Authors: Qing-Jia Xie
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/29883542065641285425
id ndltd-TW-094NTU05318071
record_format oai_dc
spelling ndltd-TW-094NTU053180712015-12-16T04:38:37Z http://ndltd.ncl.edu.tw/handle/29883542065641285425 A field study on hacker invasion and defensive strategy of information security of ROC government 台灣政府遭駭客入侵管道及防禦策略現況之研究 Ben-Shan Liu 劉本善 碩士 國立臺灣大學 商學研究所 94 PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on information status quo of Taiwan government in depth which including “invading path”, “assaulting model” and “security strategy”, in order to clear up usual patterns that hackers are using as a path to break into specific information system,and help to find out adaptive protection strategy for information system. This research has taken 561 sample sizes from units of ROC government as a target, and adopted field study method to test three hypotheses. It has been found that “assaulting model” and “security strategy” were both of significance with “invading path” factor. We hence have concluded two results:First, the different types of invading path that hackers adopted will effect on assaulting manners, it means that hacker assaulting manners are varied depending on invading path. Second, the higher information security grades of the information system, the lesser opportunity the information system being invaded. Results of this study can be referenced to build up protection strategy and counter measure for the information security, and hope it can be of help to the step-searcher. Qing-Jia Xie Chon-Shing Huang 謝清佳 黃崇興 2005 學位論文 ; thesis 60 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 商學研究所 === 94 === PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on information status quo of Taiwan government in depth which including “invading path”, “assaulting model” and “security strategy”, in order to clear up usual patterns that hackers are using as a path to break into specific information system,and help to find out adaptive protection strategy for information system. This research has taken 561 sample sizes from units of ROC government as a target, and adopted field study method to test three hypotheses. It has been found that “assaulting model” and “security strategy” were both of significance with “invading path” factor. We hence have concluded two results:First, the different types of invading path that hackers adopted will effect on assaulting manners, it means that hacker assaulting manners are varied depending on invading path. Second, the higher information security grades of the information system, the lesser opportunity the information system being invaded. Results of this study can be referenced to build up protection strategy and counter measure for the information security, and hope it can be of help to the step-searcher.
author2 Qing-Jia Xie
author_facet Qing-Jia Xie
Ben-Shan Liu
劉本善
author Ben-Shan Liu
劉本善
spellingShingle Ben-Shan Liu
劉本善
A field study on hacker invasion and defensive strategy of information security of ROC government
author_sort Ben-Shan Liu
title A field study on hacker invasion and defensive strategy of information security of ROC government
title_short A field study on hacker invasion and defensive strategy of information security of ROC government
title_full A field study on hacker invasion and defensive strategy of information security of ROC government
title_fullStr A field study on hacker invasion and defensive strategy of information security of ROC government
title_full_unstemmed A field study on hacker invasion and defensive strategy of information security of ROC government
title_sort field study on hacker invasion and defensive strategy of information security of roc government
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/29883542065641285425
work_keys_str_mv AT benshanliu afieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment
AT liúběnshàn afieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment
AT benshanliu táiwānzhèngfǔzāohàikèrùqīnguǎndàojífángyùcèlüèxiànkuàngzhīyánjiū
AT liúběnshàn táiwānzhèngfǔzāohàikèrùqīnguǎndàojífángyùcèlüèxiànkuàngzhīyánjiū
AT benshanliu fieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment
AT liúběnshàn fieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment
_version_ 1718150292872101888