Conceptual Models and the Implementations of the information Security Management and Education System

博士 === 國立臺灣大學 === 工程科學及海洋工程學研究所 === 98 === The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop application...

Full description

Bibliographic Details
Main Authors: Tung-Ju Chiang, 江通儒
Other Authors: Jen-Shiang Kouh
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/94517390521484438096
id ndltd-TW-098NTU05345061
record_format oai_dc
spelling ndltd-TW-098NTU053450612015-11-02T04:04:02Z http://ndltd.ncl.edu.tw/handle/94517390521484438096 Conceptual Models and the Implementations of the information Security Management and Education System 資訊安全管理及教育系統之概念式模型與應用 Tung-Ju Chiang 江通儒 博士 國立臺灣大學 工程科學及海洋工程學研究所 98 The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop applications. A contribution of the presented work is the adoption of RIAs and their technologies, MXML and ActionScript 3, to extend the features of the existing ISMS. Multiple criteria decision making (MCDM) refers to find the best opinion from all of the alternatives. Some methods of MCDM used in this paper are Analytic hierarchy process (AHP), Fuzzy Analytic Hierarchy Process (FAHP), and Grey Relational Analysis (GRA). Besides this, ontologies are typically presented as tree structure containing all the relevant entities and their relationships and rules within that domain knowledge. Rules may be used for creating new rules, defining classes and properties of the ontology. To use the ontologies and rules to implement the knowledge management is the other purpose of this work. This system also uses the semantic web technologies, such as semantic web rule language (SWRL), SPARQL, SQWRL to query and infer domain knowledge. There are two models proposed in this paper, the meta model of the information security management (MMISM) and the information security maturity model (ISEMM). There are four parts of MMISM, including security requirement and risk analysis, meta-policy, meta-process and the PLOAT view of the implementation model. For the purpose of expanding the scope of ISMS certification, PLOAT view is proposed and it stands for People, Legal, Organization, Asset and Technology. In ISEMM, there are five levels from top to bottom, which are role, certification, standard, course and knowledge level. Jen-Shiang Kouh 郭真祥 2010 學位論文 ; thesis 168 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立臺灣大學 === 工程科學及海洋工程學研究所 === 98 === The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop applications. A contribution of the presented work is the adoption of RIAs and their technologies, MXML and ActionScript 3, to extend the features of the existing ISMS. Multiple criteria decision making (MCDM) refers to find the best opinion from all of the alternatives. Some methods of MCDM used in this paper are Analytic hierarchy process (AHP), Fuzzy Analytic Hierarchy Process (FAHP), and Grey Relational Analysis (GRA). Besides this, ontologies are typically presented as tree structure containing all the relevant entities and their relationships and rules within that domain knowledge. Rules may be used for creating new rules, defining classes and properties of the ontology. To use the ontologies and rules to implement the knowledge management is the other purpose of this work. This system also uses the semantic web technologies, such as semantic web rule language (SWRL), SPARQL, SQWRL to query and infer domain knowledge. There are two models proposed in this paper, the meta model of the information security management (MMISM) and the information security maturity model (ISEMM). There are four parts of MMISM, including security requirement and risk analysis, meta-policy, meta-process and the PLOAT view of the implementation model. For the purpose of expanding the scope of ISMS certification, PLOAT view is proposed and it stands for People, Legal, Organization, Asset and Technology. In ISEMM, there are five levels from top to bottom, which are role, certification, standard, course and knowledge level.
author2 Jen-Shiang Kouh
author_facet Jen-Shiang Kouh
Tung-Ju Chiang
江通儒
author Tung-Ju Chiang
江通儒
spellingShingle Tung-Ju Chiang
江通儒
Conceptual Models and the Implementations of the information Security Management and Education System
author_sort Tung-Ju Chiang
title Conceptual Models and the Implementations of the information Security Management and Education System
title_short Conceptual Models and the Implementations of the information Security Management and Education System
title_full Conceptual Models and the Implementations of the information Security Management and Education System
title_fullStr Conceptual Models and the Implementations of the information Security Management and Education System
title_full_unstemmed Conceptual Models and the Implementations of the information Security Management and Education System
title_sort conceptual models and the implementations of the information security management and education system
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/94517390521484438096
work_keys_str_mv AT tungjuchiang conceptualmodelsandtheimplementationsoftheinformationsecuritymanagementandeducationsystem
AT jiāngtōngrú conceptualmodelsandtheimplementationsoftheinformationsecuritymanagementandeducationsystem
AT tungjuchiang zīxùnānquánguǎnlǐjíjiàoyùxìtǒngzhīgàiniànshìmóxíngyǔyīngyòng
AT jiāngtōngrú zīxùnānquánguǎnlǐjíjiàoyùxìtǒngzhīgàiniànshìmóxíngyǔyīngyòng
_version_ 1718119848884568064