The Application of Risk Assessment Method in the E-mail System

碩士 === 華梵大學 === 資訊管理學系碩士班 === 95 === Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using r...

Full description

Bibliographic Details
Main Authors: Chia-Ming Liu, 劉家明
Other Authors: Huei-Chung Chu
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/18983380196866782770
id ndltd-TW-095HCHT0396007
record_format oai_dc
spelling ndltd-TW-095HCHT03960072016-05-25T04:14:20Z http://ndltd.ncl.edu.tw/handle/18983380196866782770 The Application of Risk Assessment Method in the E-mail System 風險評鑑方法應用於電子郵件系統安全之研究 Chia-Ming Liu 劉家明 碩士 華梵大學 資訊管理學系碩士班 95 Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using risk assessment methodology to identify the threat and vulnerability of the system, and then evaluate the potential damage and define the security policies. It doesn’t only fulfill the integration of business objective and security policies, but also achieve the CIA. Although BS7799-3 will be the ISO 27005 standard, AS/NZS 4360 still have its function. In this research, three methodologies were evaluated and applied in the E-MAIL system. The result showed that BS7799-3 is good for identifying the components of risk, and AZ/NZS 4360 can help the user to examine the whole system risk. Both have their advantageous perspective. Huei-Chung Chu 朱惠中 2007 學位論文 ; thesis 128 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 95 === Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using risk assessment methodology to identify the threat and vulnerability of the system, and then evaluate the potential damage and define the security policies. It doesn’t only fulfill the integration of business objective and security policies, but also achieve the CIA. Although BS7799-3 will be the ISO 27005 standard, AS/NZS 4360 still have its function. In this research, three methodologies were evaluated and applied in the E-MAIL system. The result showed that BS7799-3 is good for identifying the components of risk, and AZ/NZS 4360 can help the user to examine the whole system risk. Both have their advantageous perspective.
author2 Huei-Chung Chu
author_facet Huei-Chung Chu
Chia-Ming Liu
劉家明
author Chia-Ming Liu
劉家明
spellingShingle Chia-Ming Liu
劉家明
The Application of Risk Assessment Method in the E-mail System
author_sort Chia-Ming Liu
title The Application of Risk Assessment Method in the E-mail System
title_short The Application of Risk Assessment Method in the E-mail System
title_full The Application of Risk Assessment Method in the E-mail System
title_fullStr The Application of Risk Assessment Method in the E-mail System
title_full_unstemmed The Application of Risk Assessment Method in the E-mail System
title_sort application of risk assessment method in the e-mail system
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/18983380196866782770
work_keys_str_mv AT chiamingliu theapplicationofriskassessmentmethodintheemailsystem
AT liújiāmíng theapplicationofriskassessmentmethodintheemailsystem
AT chiamingliu fēngxiǎnpíngjiànfāngfǎyīngyòngyúdiànziyóujiànxìtǒngānquánzhīyánjiū
AT liújiāmíng fēngxiǎnpíngjiànfāngfǎyīngyòngyúdiànziyóujiànxìtǒngānquánzhīyánjiū
AT chiamingliu applicationofriskassessmentmethodintheemailsystem
AT liújiāmíng applicationofriskassessmentmethodintheemailsystem
_version_ 1718280585827319808