A field study on hacker invasion and defensive strategy of information security of ROC government
碩士 === 國立臺灣大學 === 商學研究所 === 94 === PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on infor...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/29883542065641285425 |
id |
ndltd-TW-094NTU05318071 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NTU053180712015-12-16T04:38:37Z http://ndltd.ncl.edu.tw/handle/29883542065641285425 A field study on hacker invasion and defensive strategy of information security of ROC government 台灣政府遭駭客入侵管道及防禦策略現況之研究 Ben-Shan Liu 劉本善 碩士 國立臺灣大學 商學研究所 94 PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on information status quo of Taiwan government in depth which including “invading path”, “assaulting model” and “security strategy”, in order to clear up usual patterns that hackers are using as a path to break into specific information system,and help to find out adaptive protection strategy for information system. This research has taken 561 sample sizes from units of ROC government as a target, and adopted field study method to test three hypotheses. It has been found that “assaulting model” and “security strategy” were both of significance with “invading path” factor. We hence have concluded two results:First, the different types of invading path that hackers adopted will effect on assaulting manners, it means that hacker assaulting manners are varied depending on invading path. Second, the higher information security grades of the information system, the lesser opportunity the information system being invaded. Results of this study can be referenced to build up protection strategy and counter measure for the information security, and hope it can be of help to the step-searcher. Qing-Jia Xie Chon-Shing Huang 謝清佳 黃崇興 2005 學位論文 ; thesis 60 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 商學研究所 === 94 === PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on information status quo of Taiwan government in depth which including “invading path”, “assaulting model” and “security strategy”, in order to clear up usual patterns that hackers are using as a path to break into specific information system,and help to find out adaptive protection strategy for information system.
This research has taken 561 sample sizes from units of ROC government as a target, and adopted field study method to test three hypotheses. It has been found that “assaulting model” and “security strategy” were both of significance with “invading path” factor. We hence have concluded two results:First, the different types of invading path that hackers adopted will effect on assaulting manners, it means that hacker assaulting manners are varied depending on invading path. Second, the higher information security grades of the information system, the lesser opportunity the information system being invaded. Results of this study can be referenced to build up protection strategy and counter measure for the information security, and hope it can be of help to the step-searcher.
|
author2 |
Qing-Jia Xie |
author_facet |
Qing-Jia Xie Ben-Shan Liu 劉本善 |
author |
Ben-Shan Liu 劉本善 |
spellingShingle |
Ben-Shan Liu 劉本善 A field study on hacker invasion and defensive strategy of information security of ROC government |
author_sort |
Ben-Shan Liu |
title |
A field study on hacker invasion and defensive strategy of information security of ROC government |
title_short |
A field study on hacker invasion and defensive strategy of information security of ROC government |
title_full |
A field study on hacker invasion and defensive strategy of information security of ROC government |
title_fullStr |
A field study on hacker invasion and defensive strategy of information security of ROC government |
title_full_unstemmed |
A field study on hacker invasion and defensive strategy of information security of ROC government |
title_sort |
field study on hacker invasion and defensive strategy of information security of roc government |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/29883542065641285425 |
work_keys_str_mv |
AT benshanliu afieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment AT liúběnshàn afieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment AT benshanliu táiwānzhèngfǔzāohàikèrùqīnguǎndàojífángyùcèlüèxiànkuàngzhīyánjiū AT liúběnshàn táiwānzhèngfǔzāohàikèrùqīnguǎndàojífángyùcèlüèxiànkuàngzhīyánjiū AT benshanliu fieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment AT liúběnshàn fieldstudyonhackerinvasionanddefensivestrategyofinformationsecurityofrocgovernment |
_version_ |
1718150292872101888 |