Case Studies on Adopting Full-Scope Information Security Management System in Organizations
碩士 === 長庚大學 === 資訊管理學研究所 === 97 === Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from externa...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/04948738289553420413 |
id |
ndltd-TW-097CGU05396048 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097CGU053960482015-10-13T12:04:56Z http://ndltd.ncl.edu.tw/handle/04948738289553420413 Case Studies on Adopting Full-Scope Information Security Management System in Organizations 全組織導入資訊安全管理系統的個案研究 Chen Hung Wang 王振鴻 碩士 長庚大學 資訊管理學研究所 97 Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from external or destroy from internal, strengthening risk management and reducing the occurrence of security incidents has become the focus point to ensure the confidentiality, integrity and availability of information systems and assets. The International Organization for Standardization officially announced ISO 27001 in April 2005. This standard is the most wildly accepted and adopted standard in the world. Based upon continual feedback management cycle, the ISO 27001 standard implements asset identification, reduces risk management, and develops information security policies to achieve the organizational objective for information security management. Interviews and surveys are performed to study four cases of organizational adaption and certification of ISMS. In particular, the following topics concerning full-scope adaptation of ISMS are presented through in-depth analysis: 1.Evaluation aspects of full-scope adaptation, 2.Critical success factors, 3.Difficulties encountered, and 4.Benefits from adopting ISMS. J. J. Hwang 黃景彰 2009 學位論文 ; thesis 152 |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 資訊管理學研究所 === 97 === Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from external or destroy from internal, strengthening risk management and reducing the occurrence of security incidents has become the focus point to ensure the confidentiality, integrity and availability of information systems and assets.
The International Organization for Standardization officially announced ISO 27001 in April 2005. This standard is the most wildly accepted and adopted standard in the world. Based upon continual feedback management cycle, the ISO 27001 standard implements asset identification, reduces risk management, and develops information security policies to achieve the organizational objective for information security management.
Interviews and surveys are performed to study four cases of organizational adaption and certification of ISMS. In particular, the following topics concerning full-scope adaptation of ISMS are presented through in-depth analysis:
1.Evaluation aspects of full-scope adaptation,
2.Critical success factors,
3.Difficulties encountered, and
4.Benefits from adopting ISMS.
|
author2 |
J. J. Hwang |
author_facet |
J. J. Hwang Chen Hung Wang 王振鴻 |
author |
Chen Hung Wang 王振鴻 |
spellingShingle |
Chen Hung Wang 王振鴻 Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
author_sort |
Chen Hung Wang |
title |
Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
title_short |
Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
title_full |
Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
title_fullStr |
Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
title_full_unstemmed |
Case Studies on Adopting Full-Scope Information Security Management System in Organizations |
title_sort |
case studies on adopting full-scope information security management system in organizations |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/04948738289553420413 |
work_keys_str_mv |
AT chenhungwang casestudiesonadoptingfullscopeinformationsecuritymanagementsysteminorganizations AT wángzhènhóng casestudiesonadoptingfullscopeinformationsecuritymanagementsysteminorganizations AT chenhungwang quánzǔzhīdǎorùzīxùnānquánguǎnlǐxìtǒngdegèànyánjiū AT wángzhènhóng quánzǔzhīdǎorùzīxùnānquánguǎnlǐxìtǒngdegèànyánjiū |
_version_ |
1716852453761089536 |