The Application of Risk Assessment Method in the E-mail System
碩士 === 華梵大學 === 資訊管理學系碩士班 === 95 === Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using r...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/18983380196866782770 |
id |
ndltd-TW-095HCHT0396007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095HCHT03960072016-05-25T04:14:20Z http://ndltd.ncl.edu.tw/handle/18983380196866782770 The Application of Risk Assessment Method in the E-mail System 風險評鑑方法應用於電子郵件系統安全之研究 Chia-Ming Liu 劉家明 碩士 華梵大學 資訊管理學系碩士班 95 Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using risk assessment methodology to identify the threat and vulnerability of the system, and then evaluate the potential damage and define the security policies. It doesn’t only fulfill the integration of business objective and security policies, but also achieve the CIA. Although BS7799-3 will be the ISO 27005 standard, AS/NZS 4360 still have its function. In this research, three methodologies were evaluated and applied in the E-MAIL system. The result showed that BS7799-3 is good for identifying the components of risk, and AZ/NZS 4360 can help the user to examine the whole system risk. Both have their advantageous perspective. Huei-Chung Chu 朱惠中 2007 學位論文 ; thesis 128 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 95 === Since the rising security problems, information managers can’t neglect the security issues. The topic that the managers concern most is how to achieve the balance between information security and budget. Some scholars found that the most effective ISMS is using risk assessment methodology to identify the threat and vulnerability of the system, and then evaluate the potential damage and define the security policies. It doesn’t only fulfill the integration of business objective and security policies, but also achieve the CIA.
Although BS7799-3 will be the ISO 27005 standard, AS/NZS 4360 still have its function. In this research, three methodologies were evaluated and applied in the E-MAIL system. The result showed that BS7799-3 is good for identifying the components of risk, and AZ/NZS 4360 can help the user to examine the whole system risk. Both have their advantageous perspective.
|
author2 |
Huei-Chung Chu |
author_facet |
Huei-Chung Chu Chia-Ming Liu 劉家明 |
author |
Chia-Ming Liu 劉家明 |
spellingShingle |
Chia-Ming Liu 劉家明 The Application of Risk Assessment Method in the E-mail System |
author_sort |
Chia-Ming Liu |
title |
The Application of Risk Assessment Method in the E-mail System |
title_short |
The Application of Risk Assessment Method in the E-mail System |
title_full |
The Application of Risk Assessment Method in the E-mail System |
title_fullStr |
The Application of Risk Assessment Method in the E-mail System |
title_full_unstemmed |
The Application of Risk Assessment Method in the E-mail System |
title_sort |
application of risk assessment method in the e-mail system |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/18983380196866782770 |
work_keys_str_mv |
AT chiamingliu theapplicationofriskassessmentmethodintheemailsystem AT liújiāmíng theapplicationofriskassessmentmethodintheemailsystem AT chiamingliu fēngxiǎnpíngjiànfāngfǎyīngyòngyúdiànziyóujiànxìtǒngānquánzhīyánjiū AT liújiāmíng fēngxiǎnpíngjiànfāngfǎyīngyòngyúdiànziyóujiànxìtǒngānquánzhīyánjiū AT chiamingliu applicationofriskassessmentmethodintheemailsystem AT liújiāmíng applicationofriskassessmentmethodintheemailsystem |
_version_ |
1718280585827319808 |