Conceptual Models and the Implementations of the information Security Management and Education System
博士 === 國立臺灣大學 === 工程科學及海洋工程學研究所 === 98 === The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop application...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/94517390521484438096 |
id |
ndltd-TW-098NTU05345061 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NTU053450612015-11-02T04:04:02Z http://ndltd.ncl.edu.tw/handle/94517390521484438096 Conceptual Models and the Implementations of the information Security Management and Education System 資訊安全管理及教育系統之概念式模型與應用 Tung-Ju Chiang 江通儒 博士 國立臺灣大學 工程科學及海洋工程學研究所 98 The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop applications. A contribution of the presented work is the adoption of RIAs and their technologies, MXML and ActionScript 3, to extend the features of the existing ISMS. Multiple criteria decision making (MCDM) refers to find the best opinion from all of the alternatives. Some methods of MCDM used in this paper are Analytic hierarchy process (AHP), Fuzzy Analytic Hierarchy Process (FAHP), and Grey Relational Analysis (GRA). Besides this, ontologies are typically presented as tree structure containing all the relevant entities and their relationships and rules within that domain knowledge. Rules may be used for creating new rules, defining classes and properties of the ontology. To use the ontologies and rules to implement the knowledge management is the other purpose of this work. This system also uses the semantic web technologies, such as semantic web rule language (SWRL), SPARQL, SQWRL to query and infer domain knowledge. There are two models proposed in this paper, the meta model of the information security management (MMISM) and the information security maturity model (ISEMM). There are four parts of MMISM, including security requirement and risk analysis, meta-policy, meta-process and the PLOAT view of the implementation model. For the purpose of expanding the scope of ISMS certification, PLOAT view is proposed and it stands for People, Legal, Organization, Asset and Technology. In ISEMM, there are five levels from top to bottom, which are role, certification, standard, course and knowledge level. Jen-Shiang Kouh 郭真祥 2010 學位論文 ; thesis 168 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立臺灣大學 === 工程科學及海洋工程學研究所 === 98 === The main purpose of the presented work is to provide a meta-model to implement the Information Security Management system (ISMS) with effect. Rich Internet Applications (RIAs) are web applications that have many of the characteristics of desktop applications. A contribution of the presented work is the adoption of RIAs and their technologies, MXML and ActionScript 3, to extend the features of the existing ISMS. Multiple criteria decision making (MCDM) refers to find the best opinion from all of the alternatives. Some methods of MCDM used in this paper are Analytic hierarchy process (AHP), Fuzzy Analytic Hierarchy Process (FAHP), and Grey Relational Analysis (GRA). Besides this, ontologies are typically presented as tree structure containing all the relevant entities and their relationships and rules within that domain knowledge. Rules may be used for creating new rules, defining classes and properties of the ontology. To use the ontologies and rules to implement the knowledge management is the other purpose of this work. This system also uses the semantic web technologies, such as semantic web rule language (SWRL), SPARQL, SQWRL to query and infer domain knowledge. There are two models proposed in this paper, the meta model of the information security management (MMISM) and the information security maturity model (ISEMM). There are four parts of MMISM, including security requirement and risk analysis, meta-policy, meta-process and the PLOAT view of the implementation model. For the purpose of expanding the scope of ISMS certification, PLOAT view is proposed and it stands for People, Legal, Organization, Asset and Technology. In ISEMM, there are five levels from top to bottom, which are role, certification, standard, course and knowledge level.
|
author2 |
Jen-Shiang Kouh |
author_facet |
Jen-Shiang Kouh Tung-Ju Chiang 江通儒 |
author |
Tung-Ju Chiang 江通儒 |
spellingShingle |
Tung-Ju Chiang 江通儒 Conceptual Models and the Implementations of the information Security Management and Education System |
author_sort |
Tung-Ju Chiang |
title |
Conceptual Models and the Implementations of the information Security Management and Education System |
title_short |
Conceptual Models and the Implementations of the information Security Management and Education System |
title_full |
Conceptual Models and the Implementations of the information Security Management and Education System |
title_fullStr |
Conceptual Models and the Implementations of the information Security Management and Education System |
title_full_unstemmed |
Conceptual Models and the Implementations of the information Security Management and Education System |
title_sort |
conceptual models and the implementations of the information security management and education system |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/94517390521484438096 |
work_keys_str_mv |
AT tungjuchiang conceptualmodelsandtheimplementationsoftheinformationsecuritymanagementandeducationsystem AT jiāngtōngrú conceptualmodelsandtheimplementationsoftheinformationsecuritymanagementandeducationsystem AT tungjuchiang zīxùnānquánguǎnlǐjíjiàoyùxìtǒngzhīgàiniànshìmóxíngyǔyīngyòng AT jiāngtōngrú zīxùnānquánguǎnlǐjíjiàoyùxìtǒngzhīgàiniànshìmóxíngyǔyīngyòng |
_version_ |
1718119848884568064 |