Studies in Information Security Management from Methods of Social Network
碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 99 === Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security managem...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/19908438693374793560 |
id |
ndltd-TW-099PCCU1650020 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099PCCU16500202017-03-23T04:35:57Z http://ndltd.ncl.edu.tw/handle/19908438693374793560 Studies in Information Security Management from Methods of Social Network 以社會網路方法探討資訊安全管理 Chuang, Sheng-Chieh 莊勝傑 碩士 中國文化大學 資訊安全產業研發碩士專班 99 Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security management is an important topic. Many of discussion of the information security management use writing to show, there is no more intuitive and similar in figures and diagrams. Because the diagram is easier than the text to understand in the various roles of information system to each other account for the influence proportion in security threat, that's can quick to infer question which rapidly needs to solve. When we consider the security solutions that should according to circumstances. We address essential of security requirement in information security that are “Integrity” , “Confidentiality” and “Availability”. This thesis provides an open framework of research for the information security management, and the information security accidents are the starting point. That use many kinds of relationships constructs the relationship network diagrams between the various roles, and identify the security issues and the solutions. Then added many kinds of influence decision of management feature after the reorganization use the many kinds of picture discussion information security management. Using relational network diagrams to propose the proposal and the policy for the information security management. Tsai, Dwen-Ren 蔡敦仁 2011 學位論文 ; thesis 67 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 99 === Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security management is an important topic.
Many of discussion of the information security management use writing to show, there is no more intuitive and similar in figures and diagrams. Because the diagram is easier than the text to understand in the various roles of information system to each other account for the influence proportion in security threat, that's can quick to infer question which rapidly needs to solve. When we consider the security solutions that should according to circumstances. We address essential of security requirement in information security that are “Integrity” , “Confidentiality” and “Availability”.
This thesis provides an open framework of research for the information security management, and the information security accidents are the starting point. That use many kinds of relationships constructs the relationship network diagrams between the various roles, and identify the security issues and the solutions. Then added many kinds of influence decision of management feature after the reorganization use the many kinds of picture discussion information security management. Using relational network diagrams to propose the proposal and the policy for the information security management.
|
author2 |
Tsai, Dwen-Ren |
author_facet |
Tsai, Dwen-Ren Chuang, Sheng-Chieh 莊勝傑 |
author |
Chuang, Sheng-Chieh 莊勝傑 |
spellingShingle |
Chuang, Sheng-Chieh 莊勝傑 Studies in Information Security Management from Methods of Social Network |
author_sort |
Chuang, Sheng-Chieh |
title |
Studies in Information Security Management from Methods of Social Network |
title_short |
Studies in Information Security Management from Methods of Social Network |
title_full |
Studies in Information Security Management from Methods of Social Network |
title_fullStr |
Studies in Information Security Management from Methods of Social Network |
title_full_unstemmed |
Studies in Information Security Management from Methods of Social Network |
title_sort |
studies in information security management from methods of social network |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/19908438693374793560 |
work_keys_str_mv |
AT chuangshengchieh studiesininformationsecuritymanagementfrommethodsofsocialnetwork AT zhuāngshèngjié studiesininformationsecuritymanagementfrommethodsofsocialnetwork AT chuangshengchieh yǐshèhuìwǎnglùfāngfǎtàntǎozīxùnānquánguǎnlǐ AT zhuāngshèngjié yǐshèhuìwǎnglùfāngfǎtàntǎozīxùnānquánguǎnlǐ |
_version_ |
1718433666354380800 |