The Study of Information Security Risk Management Systems With Hierarchical Data Protection

碩士 === 國立高雄第一科技大學 === 資訊管理研究所 === 99 === Information System is an important basis infrastructure and core operation for the enterprise. It always continues to join the management and the technical issues when we discuss the stability of its operation. The main objective is how to achieve business co...

Full description

Bibliographic Details
Main Authors: Kuan-Wen Huang, 黃冠文
Other Authors: Wen-Shenq Juang
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/75003949255792715679
id ndltd-TW-099NKIT5396038
record_format oai_dc
spelling ndltd-TW-099NKIT53960382016-04-11T04:22:09Z http://ndltd.ncl.edu.tw/handle/75003949255792715679 The Study of Information Security Risk Management Systems With Hierarchical Data Protection 支援階層式資料保護之資訊安全風險管理系統之研究 Kuan-Wen Huang 黃冠文 碩士 國立高雄第一科技大學 資訊管理研究所 99 Information System is an important basis infrastructure and core operation for the enterprise. It always continues to join the management and the technical issues when we discuss the stability of its operation. The main objective is how to achieve business continuity without interrupting services. In recent years, one of the largest business needs to improve is the importance of data protection. Taking the hospital for example, whether the service is interrupted or data is leaked, it will damage people’s lives or health, or the image of the hospital. Therefore, an information security control measure has proposed for the computerized information system infrastructure, which is ISMS(Information Security Management System). Based on this method, positive and accurate implementation of information security risk management is to effectively reduce the potential various information security threats. In this thesis, we propose a risk management system by using relevant methods and analyze the operation of ISMS risk management. We design and develop an information security risk management system with hierarchical data protection. In our thesis, we implement a risk management system and evaluate the risk value. This important risk information can be protected in order to satisfy the decentralized risk management of data protection requirements. Wen-Shenq Juang 莊文勝 2011 學位論文 ; thesis 61 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立高雄第一科技大學 === 資訊管理研究所 === 99 === Information System is an important basis infrastructure and core operation for the enterprise. It always continues to join the management and the technical issues when we discuss the stability of its operation. The main objective is how to achieve business continuity without interrupting services. In recent years, one of the largest business needs to improve is the importance of data protection. Taking the hospital for example, whether the service is interrupted or data is leaked, it will damage people’s lives or health, or the image of the hospital. Therefore, an information security control measure has proposed for the computerized information system infrastructure, which is ISMS(Information Security Management System). Based on this method, positive and accurate implementation of information security risk management is to effectively reduce the potential various information security threats. In this thesis, we propose a risk management system by using relevant methods and analyze the operation of ISMS risk management. We design and develop an information security risk management system with hierarchical data protection. In our thesis, we implement a risk management system and evaluate the risk value. This important risk information can be protected in order to satisfy the decentralized risk management of data protection requirements.
author2 Wen-Shenq Juang
author_facet Wen-Shenq Juang
Kuan-Wen Huang
黃冠文
author Kuan-Wen Huang
黃冠文
spellingShingle Kuan-Wen Huang
黃冠文
The Study of Information Security Risk Management Systems With Hierarchical Data Protection
author_sort Kuan-Wen Huang
title The Study of Information Security Risk Management Systems With Hierarchical Data Protection
title_short The Study of Information Security Risk Management Systems With Hierarchical Data Protection
title_full The Study of Information Security Risk Management Systems With Hierarchical Data Protection
title_fullStr The Study of Information Security Risk Management Systems With Hierarchical Data Protection
title_full_unstemmed The Study of Information Security Risk Management Systems With Hierarchical Data Protection
title_sort study of information security risk management systems with hierarchical data protection
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/75003949255792715679
work_keys_str_mv AT kuanwenhuang thestudyofinformationsecurityriskmanagementsystemswithhierarchicaldataprotection
AT huángguānwén thestudyofinformationsecurityriskmanagementsystemswithhierarchicaldataprotection
AT kuanwenhuang zhīyuánjiēcéngshìzīliàobǎohùzhīzīxùnānquánfēngxiǎnguǎnlǐxìtǒngzhīyánjiū
AT huángguānwén zhīyuánjiēcéngshìzīliàobǎohùzhīzīxùnānquánfēngxiǎnguǎnlǐxìtǒngzhīyánjiū
AT kuanwenhuang studyofinformationsecurityriskmanagementsystemswithhierarchicaldataprotection
AT huángguānwén studyofinformationsecurityriskmanagementsystemswithhierarchicaldataprotection
_version_ 1718219784640790528