Study of Information Security Incident Information Sharing Mechanism

碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 98 === Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security...

Full description

Bibliographic Details
Main Authors: Wen-Chi Chen, 陳文其
Other Authors: Chii-Wen Wu
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/54394424150170102709
id ndltd-TW-098PCCU1650007
record_format oai_dc
spelling ndltd-TW-098PCCU16500072017-02-23T04:27:14Z http://ndltd.ncl.edu.tw/handle/54394424150170102709 Study of Information Security Incident Information Sharing Mechanism 資訊安全事故資訊分享機制之研究 Wen-Chi Chen 陳文其 碩士 中國文化大學 資訊安全產業研發碩士專班 98 Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security venders can do, are fixing the bugs related to the system loopholes, adapting appropriate defend processes depend on the characters of malicious programs or detecting and stopping the attacks activities. The defend ways has been implemented for years but the security venders still have not broken away for the security attacks. When the new types of malicious attacks happen, the damage in the early stage is higher and many times than middle stage. Based on the commercial interest, the companies reluctant to share the information of new types of security attacks, however the commercial losses caused by new type of security attacks are inestimable. Based on the purpose of not harming commercial interest, this research aims at providing a new type of information sharing system of information security incidents. According to this system, the information security consulting venders could lower their concerns that the security information sharing could cause the commercial loss, reduce the damage caused by new type of security attack in the early stage when attacks happen, controlling the spread of security attacks and eliminate these activities quickly. Finally, through literature review and technique analysis, this research finds out and studies the difficulties of sharing the information security incidents, and then brings up a practical and acceptable an information sharing system. Chii-Wen Wu Dwen-Ren Tsai 吳啟文 蔡敦仁 2010 學位論文 ; thesis 73 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 98 === Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security venders can do, are fixing the bugs related to the system loopholes, adapting appropriate defend processes depend on the characters of malicious programs or detecting and stopping the attacks activities. The defend ways has been implemented for years but the security venders still have not broken away for the security attacks. When the new types of malicious attacks happen, the damage in the early stage is higher and many times than middle stage. Based on the commercial interest, the companies reluctant to share the information of new types of security attacks, however the commercial losses caused by new type of security attacks are inestimable. Based on the purpose of not harming commercial interest, this research aims at providing a new type of information sharing system of information security incidents. According to this system, the information security consulting venders could lower their concerns that the security information sharing could cause the commercial loss, reduce the damage caused by new type of security attack in the early stage when attacks happen, controlling the spread of security attacks and eliminate these activities quickly. Finally, through literature review and technique analysis, this research finds out and studies the difficulties of sharing the information security incidents, and then brings up a practical and acceptable an information sharing system.
author2 Chii-Wen Wu
author_facet Chii-Wen Wu
Wen-Chi Chen
陳文其
author Wen-Chi Chen
陳文其
spellingShingle Wen-Chi Chen
陳文其
Study of Information Security Incident Information Sharing Mechanism
author_sort Wen-Chi Chen
title Study of Information Security Incident Information Sharing Mechanism
title_short Study of Information Security Incident Information Sharing Mechanism
title_full Study of Information Security Incident Information Sharing Mechanism
title_fullStr Study of Information Security Incident Information Sharing Mechanism
title_full_unstemmed Study of Information Security Incident Information Sharing Mechanism
title_sort study of information security incident information sharing mechanism
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/54394424150170102709
work_keys_str_mv AT wenchichen studyofinformationsecurityincidentinformationsharingmechanism
AT chénwénqí studyofinformationsecurityincidentinformationsharingmechanism
AT wenchichen zīxùnānquánshìgùzīxùnfēnxiǎngjīzhìzhīyánjiū
AT chénwénqí zīxùnānquánshìgùzīxùnfēnxiǎngjīzhìzhīyánjiū
_version_ 1718416085645000704