Design and implementation of an audit tool for data leakage
碩士 === 國立政治大學 === 資訊科學學系 === 97 === The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity o...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/25874031118455041430 |
id |
ndltd-TW-097NCCU5394030 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NCCU53940302015-11-20T04:19:08Z http://ndltd.ncl.edu.tw/handle/25874031118455041430 Design and implementation of an audit tool for data leakage 資料外洩稽核工具之設計與實作 Kao, Hua Chih 高華志 碩士 國立政治大學 資訊科學學系 97 The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity of application systems of information makes it very difficult to ensure that the information systems conform to all the privacy regulations and polices. Although most corporations have established some privacy policies for controlling physical documents and various hardware devices, the main problem for data leakage is at application layer. Application developers could retrieve sensitive data by exploiting application flaws. This poses great challenges to information system auditors. Firstly, it is rather difficult for auditors to review the code to spot the flaws. Secondly, it is impractical to make a new coding standard and re-write the legacy applications accordingly. Thirdly, application developers lack the motivation to improve the protection level of existing systems. Cheng, Kung 陳恭 2009 學位論文 ; thesis 59 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立政治大學 === 資訊科學學系 === 97 === The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity of application systems of information makes it very difficult to ensure that the information systems conform to all the privacy regulations and polices. Although most corporations have established some privacy policies for controlling physical documents and various hardware devices, the main problem for data leakage is at application layer. Application developers could retrieve sensitive data by exploiting application flaws. This poses great challenges to information system auditors. Firstly, it is rather difficult for auditors to review the code to spot the flaws. Secondly, it is impractical to make a new coding standard and re-write the legacy applications accordingly. Thirdly, application developers lack the motivation to improve the protection level of existing systems.
|
author2 |
Cheng, Kung |
author_facet |
Cheng, Kung Kao, Hua Chih 高華志 |
author |
Kao, Hua Chih 高華志 |
spellingShingle |
Kao, Hua Chih 高華志 Design and implementation of an audit tool for data leakage |
author_sort |
Kao, Hua Chih |
title |
Design and implementation of an audit tool for data leakage |
title_short |
Design and implementation of an audit tool for data leakage |
title_full |
Design and implementation of an audit tool for data leakage |
title_fullStr |
Design and implementation of an audit tool for data leakage |
title_full_unstemmed |
Design and implementation of an audit tool for data leakage |
title_sort |
design and implementation of an audit tool for data leakage |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/25874031118455041430 |
work_keys_str_mv |
AT kaohuachih designandimplementationofanaudittoolfordataleakage AT gāohuázhì designandimplementationofanaudittoolfordataleakage AT kaohuachih zīliàowàixièjīhégōngjùzhīshèjìyǔshízuò AT gāohuázhì zīliàowàixièjīhégōngjùzhīshèjìyǔshízuò |
_version_ |
1718132560976936960 |