An Intrusion Event Initialized From The Email Social Engineering Attack
碩士 === 國立臺灣科技大學 === 管理研究所 === 102 === This study applies the writing method of Harvard case study. The study states the organization implement the security information system and execute the email social engineering test and training but users are still lack awareness of information security. Hacker...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15946594424458300721 |
id |
ndltd-TW-102NTUS5399059 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NTUS53990592016-03-09T04:30:58Z http://ndltd.ncl.edu.tw/handle/15946594424458300721 An Intrusion Event Initialized From The Email Social Engineering Attack 由電子郵件社交工程起始的系統入侵事件 Chi Sheng Kao 高啟聖 碩士 國立臺灣科技大學 管理研究所 102 This study applies the writing method of Harvard case study. The study states the organization implement the security information system and execute the email social engineering test and training but users are still lack awareness of information security. Hackers use an email to invade the internal easily, the case how to solve this problem? How the case balance security and convenience when they manage security information system. This paper contains case content and manual for teachers. This study describe how the user execute the email in detail so the hacker intrude the organization. While the organization implement the security information system, high level managers and staff have different tune, which led to the problem? Why the education and training can’t reach the original goal? The case combine the theory and practice, so the readers can take better action when they encounter similar problems. Ruey Huei Yeh 葉瑞徽 2014 學位論文 ; thesis 30 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 管理研究所 === 102 === This study applies the writing method of Harvard case study. The study states the organization implement the security information system and execute the email social engineering test and training but users are still lack awareness of information security. Hackers use an email to invade the internal easily, the case how to solve this problem? How the case balance security and convenience when they manage security information system.
This paper contains case content and manual for teachers. This study describe how the user execute the email in detail so the hacker intrude the organization. While the organization implement the security information system, high level managers and staff have different tune, which led to the problem? Why the education and training can’t reach the original goal? The case combine the theory and practice, so the readers can take better action when they encounter similar problems.
|
author2 |
Ruey Huei Yeh |
author_facet |
Ruey Huei Yeh Chi Sheng Kao 高啟聖 |
author |
Chi Sheng Kao 高啟聖 |
spellingShingle |
Chi Sheng Kao 高啟聖 An Intrusion Event Initialized From The Email Social Engineering Attack |
author_sort |
Chi Sheng Kao |
title |
An Intrusion Event Initialized From The Email Social Engineering Attack |
title_short |
An Intrusion Event Initialized From The Email Social Engineering Attack |
title_full |
An Intrusion Event Initialized From The Email Social Engineering Attack |
title_fullStr |
An Intrusion Event Initialized From The Email Social Engineering Attack |
title_full_unstemmed |
An Intrusion Event Initialized From The Email Social Engineering Attack |
title_sort |
intrusion event initialized from the email social engineering attack |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/15946594424458300721 |
work_keys_str_mv |
AT chishengkao anintrusioneventinitializedfromtheemailsocialengineeringattack AT gāoqǐshèng anintrusioneventinitializedfromtheemailsocialengineeringattack AT chishengkao yóudiànziyóujiànshèjiāogōngchéngqǐshǐdexìtǒngrùqīnshìjiàn AT gāoqǐshèng yóudiànziyóujiànshèjiāogōngchéngqǐshǐdexìtǒngrùqīnshìjiàn AT chishengkao intrusioneventinitializedfromtheemailsocialengineeringattack AT gāoqǐshèng intrusioneventinitializedfromtheemailsocialengineeringattack |
_version_ |
1718201765165268992 |