A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
碩士 === 中國文化大學 === 資訊管理學系碩士在職專班 === 102 === Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10868642773761817807 |
id |
ndltd-TW-102PCCU1396032 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102PCCU13960322016-02-21T04:27:14Z http://ndltd.ncl.edu.tw/handle/10868642773761817807 A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy APT攻擊對企業資安政策之影響 Hsiang Chi 季祥 碩士 中國文化大學 資訊管理學系碩士在職專班 102 Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges. To help governments and enterprises react to the challenges mentioned above, this research propose a five-dimensional InfoSec strategy framework covering 29 items through literature review. Furthermore, to validate the propose framework and to identify the key issues, 32 InfoSec experts are invited to participate the three-round survey through Delphi method. Our results show that the topics and issues covered are almost the same for the case of APT and that of traditional threats; however, the focal issues worth paying attention to and the suggested way in rethinking of the whole InfoSec strategy are obviously different, from the very nature. In particular, this research finds that the most important five items in APT scenarios are: information exchange (Email), network access control (network segmentation), malicious codes and mobile codes prevention (endpoint security), drills and review of social engineering prevention, and network security management (firewall and intrusion detection). It is suggested that corporate should examine the current InfoSec policies and re-evaluate the risk with technical standards. Chien-Liang Kuo 郭建良 2014 學位論文 ; thesis 107 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中國文化大學 === 資訊管理學系碩士在職專班 === 102 === Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges.
To help governments and enterprises react to the challenges mentioned above, this research propose a five-dimensional InfoSec strategy framework covering 29 items through literature review. Furthermore, to validate the propose framework and to identify the key issues, 32 InfoSec experts are invited to participate the three-round survey through Delphi method. Our results show that the topics and issues covered are almost the same for the case of APT and that of traditional threats; however, the focal issues worth paying attention to and the suggested way in rethinking of the whole InfoSec strategy are obviously different, from the very nature. In particular, this research finds that the most important five items in APT scenarios are: information exchange (Email), network access control (network segmentation), malicious codes and mobile codes prevention (endpoint security), drills and review of social engineering prevention, and network security management (firewall and intrusion detection). It is suggested that corporate should examine the current InfoSec policies and re-evaluate the risk with technical standards.
|
author2 |
Chien-Liang Kuo |
author_facet |
Chien-Liang Kuo Hsiang Chi 季祥 |
author |
Hsiang Chi 季祥 |
spellingShingle |
Hsiang Chi 季祥 A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
author_sort |
Hsiang Chi |
title |
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
title_short |
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
title_full |
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
title_fullStr |
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
title_full_unstemmed |
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy |
title_sort |
study on the impacts of advanced persistent threat (apt) on corporate information security policy |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/10868642773761817807 |
work_keys_str_mv |
AT hsiangchi astudyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy AT jìxiáng astudyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy AT hsiangchi aptgōngjīduìqǐyèzīānzhèngcèzhīyǐngxiǎng AT jìxiáng aptgōngjīduìqǐyèzīānzhèngcèzhīyǐngxiǎng AT hsiangchi studyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy AT jìxiáng studyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy |
_version_ |
1718193636446830592 |