A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example
碩士 === 世新大學 === 資訊傳播學研究所(含碩專班) === 100 === The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information se...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/45528011132609010011 |
id |
ndltd-TW-100SHU05676034 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100SHU056760342015-10-13T21:17:10Z http://ndltd.ncl.edu.tw/handle/45528011132609010011 A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example 金融業資訊部門建置資訊安全專區之研究-以T銀行為例 Sheng-Hsiung Tsen 曾聖雄 碩士 世新大學 資訊傳播學研究所(含碩專班) 100 The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information security incident has affected not only the personal privacy and corporate image, but also the personal safety in serious situation. Therefore, the issue of data leakage protection has aroused special attention to the general public. The financial industry already has the basic protective measures for IT equipment, such as erecting firewalls, intrusion detection system and physical network cutting. However, during the program development and testing phase, customer data is often required for the simulation tests. The access to the confidential and sensitive data uses only the specific account owned by supervisors as the security control. As the entire process of usage is unable to be monitored after logging in, the whole process may cause many points that are not under controlled; therefore, there’s possibility to have the risk of leaking out the confidential and sensitive data. In this thesis, the hypothesis is that based on the new version of the Personal Data Protection Act requirements and the migration of Import Information Security Specification (ISO 27001) of the case bank to set up an information security zone to control the access behavior of the confidential and sensitive data in the operating environment in IT department as a response strategy to have an overall discussion. The research subjects are the programmer, system administrator, administrative staff and auditor in IT department in the financial industry. Horng-Twu Liaw Sheng-chang Wu 廖鴻圖 吳聲昌 2012 學位論文 ; thesis 104 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 世新大學 === 資訊傳播學研究所(含碩專班) === 100 === The rapid development of Internet and computer in recent years has brought the convenience to human life, and also has gradually increased the dependence on information technology. In the meantime, with the increase of information leakage and information security incident has affected not only the personal privacy and corporate image, but also the personal safety in serious situation. Therefore, the issue of data leakage protection has aroused special attention to the general public.
The financial industry already has the basic protective measures for IT equipment, such as erecting firewalls, intrusion detection system and physical network cutting. However, during the program development and testing phase, customer data is often required for the simulation tests. The access to the confidential and sensitive data uses only the specific account owned by supervisors as the security control. As the entire process of usage is unable to be monitored after logging in, the whole process may cause many points that are not under controlled; therefore, there’s possibility to have the risk of leaking out the confidential and sensitive data.
In this thesis, the hypothesis is that based on the new version of the Personal Data Protection Act requirements and the migration of Import Information Security Specification (ISO 27001) of the case bank to set up an information security zone to control the access behavior of the confidential and sensitive data in the operating environment in IT department as a response strategy to have an overall discussion. The research subjects are the programmer, system administrator, administrative staff and auditor in IT department in the financial industry.
|
author2 |
Horng-Twu Liaw |
author_facet |
Horng-Twu Liaw Sheng-Hsiung Tsen 曾聖雄 |
author |
Sheng-Hsiung Tsen 曾聖雄 |
spellingShingle |
Sheng-Hsiung Tsen 曾聖雄 A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
author_sort |
Sheng-Hsiung Tsen |
title |
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
title_short |
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
title_full |
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
title_fullStr |
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
title_full_unstemmed |
A Study on Building a Security Zone of the Financial Industry Information Department – Take Bank T as A Example |
title_sort |
study on building a security zone of the financial industry information department – take bank t as a example |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/45528011132609010011 |
work_keys_str_mv |
AT shenghsiungtsen astudyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample AT céngshèngxióng astudyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample AT shenghsiungtsen jīnróngyèzīxùnbùménjiànzhìzīxùnānquánzhuānqūzhīyánjiūyǐtyínxíngwèilì AT céngshèngxióng jīnróngyèzīxùnbùménjiànzhìzīxùnānquánzhuānqūzhīyánjiūyǐtyínxíngwèilì AT shenghsiungtsen studyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample AT céngshèngxióng studyonbuildingasecurityzoneofthefinancialindustryinformationdepartmenttakebanktasaexample |
_version_ |
1718059343900835840 |