Study of Information Security Incident Information Sharing Mechanism
碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 98 === Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/54394424150170102709 |
id |
ndltd-TW-098PCCU1650007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098PCCU16500072017-02-23T04:27:14Z http://ndltd.ncl.edu.tw/handle/54394424150170102709 Study of Information Security Incident Information Sharing Mechanism 資訊安全事故資訊分享機制之研究 Wen-Chi Chen 陳文其 碩士 中國文化大學 資訊安全產業研發碩士專班 98 Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security venders can do, are fixing the bugs related to the system loopholes, adapting appropriate defend processes depend on the characters of malicious programs or detecting and stopping the attacks activities. The defend ways has been implemented for years but the security venders still have not broken away for the security attacks. When the new types of malicious attacks happen, the damage in the early stage is higher and many times than middle stage. Based on the commercial interest, the companies reluctant to share the information of new types of security attacks, however the commercial losses caused by new type of security attacks are inestimable. Based on the purpose of not harming commercial interest, this research aims at providing a new type of information sharing system of information security incidents. According to this system, the information security consulting venders could lower their concerns that the security information sharing could cause the commercial loss, reduce the damage caused by new type of security attack in the early stage when attacks happen, controlling the spread of security attacks and eliminate these activities quickly. Finally, through literature review and technique analysis, this research finds out and studies the difficulties of sharing the information security incidents, and then brings up a practical and acceptable an information sharing system. Chii-Wen Wu Dwen-Ren Tsai 吳啟文 蔡敦仁 2010 學位論文 ; thesis 73 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 98 === Nowadays with the booming of developing the information technology, information security consulting venders have sprung up like bamboo shoots after spring rain since the security events emerge in endlessly. Facing these malicious attacks, the ways, security venders can do, are fixing the bugs related to the system loopholes, adapting appropriate defend processes depend on the characters of malicious programs or detecting and stopping the attacks activities. The defend ways has been implemented for years but the security venders still have not broken away for the security attacks. When the new types of malicious attacks happen, the damage in the early stage is higher and many times than middle stage.
Based on the commercial interest, the companies reluctant to share the information of new types of security attacks, however the commercial losses caused by new type of security attacks are inestimable. Based on the purpose of not harming commercial interest, this research aims at providing a new type of information sharing system of information security incidents. According to this system, the information security consulting venders could lower their concerns that the security information sharing could cause the commercial loss, reduce the damage caused by new type of security attack in the early stage when attacks happen, controlling the spread of security attacks and eliminate these activities quickly.
Finally, through literature review and technique analysis, this research finds out and studies the difficulties of sharing the information security incidents, and then brings up a practical and acceptable an information sharing system.
|
author2 |
Chii-Wen Wu |
author_facet |
Chii-Wen Wu Wen-Chi Chen 陳文其 |
author |
Wen-Chi Chen 陳文其 |
spellingShingle |
Wen-Chi Chen 陳文其 Study of Information Security Incident Information Sharing Mechanism |
author_sort |
Wen-Chi Chen |
title |
Study of Information Security Incident Information Sharing Mechanism |
title_short |
Study of Information Security Incident Information Sharing Mechanism |
title_full |
Study of Information Security Incident Information Sharing Mechanism |
title_fullStr |
Study of Information Security Incident Information Sharing Mechanism |
title_full_unstemmed |
Study of Information Security Incident Information Sharing Mechanism |
title_sort |
study of information security incident information sharing mechanism |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/54394424150170102709 |
work_keys_str_mv |
AT wenchichen studyofinformationsecurityincidentinformationsharingmechanism AT chénwénqí studyofinformationsecurityincidentinformationsharingmechanism AT wenchichen zīxùnānquánshìgùzīxùnfēnxiǎngjīzhìzhīyánjiū AT chénwénqí zīxùnānquánshìgùzīxùnfēnxiǎngjīzhìzhīyánjiū |
_version_ |
1718416085645000704 |