Design and implementation of an audit tool for data leakage

碩士 === 國立政治大學 === 資訊科學學系 === 97 === The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity o...

Full description

Bibliographic Details
Main Authors: Kao, Hua Chih, 高華志
Other Authors: Cheng, Kung
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/25874031118455041430
id ndltd-TW-097NCCU5394030
record_format oai_dc
spelling ndltd-TW-097NCCU53940302015-11-20T04:19:08Z http://ndltd.ncl.edu.tw/handle/25874031118455041430 Design and implementation of an audit tool for data leakage 資料外洩稽核工具之設計與實作 Kao, Hua Chih 高華志 碩士 國立政治大學 資訊科學學系 97 The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity of application systems of information makes it very difficult to ensure that the information systems conform to all the privacy regulations and polices. Although most corporations have established some privacy policies for controlling physical documents and various hardware devices, the main problem for data leakage is at application layer. Application developers could retrieve sensitive data by exploiting application flaws. This poses great challenges to information system auditors. Firstly, it is rather difficult for auditors to review the code to spot the flaws. Secondly, it is impractical to make a new coding standard and re-write the legacy applications accordingly. Thirdly, application developers lack the motivation to improve the protection level of existing systems. Cheng, Kung 陳恭 2009 學位論文 ; thesis 59 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立政治大學 === 資訊科學學系 === 97 === The rapid spread of information technologies into every facet of our life results in a surge in attention to privacy recently. Bills are enacted and a comprehensive privacy policy becomes a sign of a responsible corporation. However, the complexity and diversity of application systems of information makes it very difficult to ensure that the information systems conform to all the privacy regulations and polices. Although most corporations have established some privacy policies for controlling physical documents and various hardware devices, the main problem for data leakage is at application layer. Application developers could retrieve sensitive data by exploiting application flaws. This poses great challenges to information system auditors. Firstly, it is rather difficult for auditors to review the code to spot the flaws. Secondly, it is impractical to make a new coding standard and re-write the legacy applications accordingly. Thirdly, application developers lack the motivation to improve the protection level of existing systems.
author2 Cheng, Kung
author_facet Cheng, Kung
Kao, Hua Chih
高華志
author Kao, Hua Chih
高華志
spellingShingle Kao, Hua Chih
高華志
Design and implementation of an audit tool for data leakage
author_sort Kao, Hua Chih
title Design and implementation of an audit tool for data leakage
title_short Design and implementation of an audit tool for data leakage
title_full Design and implementation of an audit tool for data leakage
title_fullStr Design and implementation of an audit tool for data leakage
title_full_unstemmed Design and implementation of an audit tool for data leakage
title_sort design and implementation of an audit tool for data leakage
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/25874031118455041430
work_keys_str_mv AT kaohuachih designandimplementationofanaudittoolfordataleakage
AT gāohuázhì designandimplementationofanaudittoolfordataleakage
AT kaohuachih zīliàowàixièjīhégōngjùzhīshèjìyǔshízuò
AT gāohuázhì zīliàowàixièjīhégōngjùzhīshèjìyǔshízuò
_version_ 1718132560976936960