A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example

碩士 === 世新大學 === 資訊傳播學研究所(含碩專班) === 100 === The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information se...

Full description

Bibliographic Details
Main Authors: Sheng-Hsiung Tsen, 曾聖雄
Other Authors: Horng-Twu Liaw
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/45528011132609010011
id ndltd-TW-100SHU05676034
record_format oai_dc
spelling ndltd-TW-100SHU056760342015-10-13T21:17:10Z http://ndltd.ncl.edu.tw/handle/45528011132609010011 A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example 金融業資訊部門建置資訊安全專區之研究-以T銀行為例 Sheng-Hsiung Tsen 曾聖雄 碩士 世新大學 資訊傳播學研究所(含碩專班) 100 The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information security incident has affected not only the personal privacy and corporate image, but also the personal safety in serious situation. Therefore, the issue of data leakage protection has aroused special attention to the general public. The financial industry already has the basic protective measures for IT equipment, such as erecting firewalls, intrusion detection system and physical network cutting. However, during the program development and testing phase, customer data is often required for the simulation tests. The access to the confidential and sensitive data uses only the specific account owned by supervisors as the security control. As the entire process of usage is unable to be monitored after logging in, the whole process may cause many points that are not under controlled; therefore, there’s possibility to have the risk of leaking out the confidential and sensitive data. In this thesis, the hypothesis is that based on the new version of the Personal Data Protection Act requirements and the migration of Import Information Security Specification (ISO 27001) of the case bank to set up an information security zone to control the access behavior of the confidential and sensitive data in the operating environment in IT department as a response strategy to have an overall discussion. The research subjects are the programmer, system administrator, administrative staff and auditor in IT department in the financial industry. Horng-Twu Liaw Sheng-chang Wu 廖鴻圖 吳聲昌 2012 學位論文 ; thesis 104 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 世新大學 === 資訊傳播學研究所(含碩專班) === 100 === The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information security incident has affected not only the personal privacy and corporate image, but also the personal safety in serious situation. Therefore, the issue of data leakage protection has aroused special attention to the general public. The financial industry already has the basic protective measures for IT equipment, such as erecting firewalls, intrusion detection system and physical network cutting. However, during the program development and testing phase, customer data is often required for the simulation tests. The access to the confidential and sensitive data uses only the specific account owned by supervisors as the security control. As the entire process of usage is unable to be monitored after logging in, the whole process may cause many points that are not under controlled; therefore, there’s possibility to have the risk of leaking out the confidential and sensitive data. In this thesis, the hypothesis is that based on the new version of the Personal Data Protection Act requirements and the migration of Import Information Security Specification (ISO 27001) of the case bank to set up an information security zone to control the access behavior of the confidential and sensitive data in the operating environment in IT department as a response strategy to have an overall discussion. The research subjects are the programmer, system administrator, administrative staff and auditor in IT department in the financial industry.
author2 Horng-Twu Liaw
author_facet Horng-Twu Liaw
Sheng-Hsiung Tsen
曾聖雄
author Sheng-Hsiung Tsen
曾聖雄
spellingShingle Sheng-Hsiung Tsen
曾聖雄
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
author_sort Sheng-Hsiung Tsen
title A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
title_short A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
title_full A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
title_fullStr A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
title_full_unstemmed A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
title_sort study on building a security zone of the financial industry information department – take bank t as a example
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/45528011132609010011
work_keys_str_mv AT shenghsiungtsen astudyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample
AT céngshèngxióng astudyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample
AT shenghsiungtsen jīnróngyèzīxùnbùménjiànzhìzīxùnānquánzhuānqūzhīyánjiūyǐtyínxíngwèilì
AT céngshèngxióng jīnróngyèzīxùnbùménjiànzhìzīxùnānquánzhuānqūzhīyánjiūyǐtyínxíngwèilì
AT shenghsiungtsen studyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample
AT céngshèngxióng studyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample
_version_ 1718059343900835840