Studies in Information Security Management from Methods of Social Network

碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 99 === Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security managem...

Full description

Bibliographic Details
Main Authors: Chuang, Sheng-Chieh, 莊勝傑
Other Authors: Tsai, Dwen-Ren
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/19908438693374793560
Description
Summary:碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 99 === Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security management is an important topic. Many of discussion of the information security management use writing to show, there is no more intuitive and similar in figures and diagrams. Because the diagram is easier than the text to understand in the various roles of information system to each other account for the influence proportion in security threat, that's can quick to infer question which rapidly needs to solve. When we consider the security solutions that should according to circumstances. We address essential of security requirement in information security that are “Integrity” , “Confidentiality” and “Availability”. This thesis provides an open framework of research for the information security management, and the information security accidents are the starting point. That use many kinds of relationships constructs the relationship network diagrams between the various roles, and identify the security issues and the solutions. Then added many kinds of influence decision of management feature after the reorganization use the many kinds of picture discussion information security management. Using relational network diagrams to propose the proposal and the policy for the information security management.