A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy

碩士 === 中國文化大學 === 資訊管理學系碩士在職專班 === 102 === Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes...

Full description

Bibliographic Details
Main Authors: Hsiang Chi, 季祥
Other Authors: Chien-Liang Kuo
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/10868642773761817807
id ndltd-TW-102PCCU1396032
record_format oai_dc
spelling ndltd-TW-102PCCU13960322016-02-21T04:27:14Z http://ndltd.ncl.edu.tw/handle/10868642773761817807 A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy APT攻擊對企業資安政策之影響 Hsiang Chi 季祥 碩士 中國文化大學 資訊管理學系碩士在職專班 102 Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges. To help governments and enterprises react to the challenges mentioned above, this research propose a five-dimensional InfoSec strategy framework covering 29 items through literature review. Furthermore, to validate the propose framework and to identify the key issues, 32 InfoSec experts are invited to participate the three-round survey through Delphi method. Our results show that the topics and issues covered are almost the same for the case of APT and that of traditional threats; however, the focal issues worth paying attention to and the suggested way in rethinking of the whole InfoSec strategy are obviously different, from the very nature. In particular, this research finds that the most important five items in APT scenarios are: information exchange (Email), network access control (network segmentation), malicious codes and mobile codes prevention (endpoint security), drills and review of social engineering prevention, and network security management (firewall and intrusion detection). It is suggested that corporate should examine the current InfoSec policies and re-evaluate the risk with technical standards. Chien-Liang Kuo 郭建良 2014 學位論文 ; thesis 107 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中國文化大學 === 資訊管理學系碩士在職專班 === 102 === Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges. To help governments and enterprises react to the challenges mentioned above, this research propose a five-dimensional InfoSec strategy framework covering 29 items through literature review. Furthermore, to validate the propose framework and to identify the key issues, 32 InfoSec experts are invited to participate the three-round survey through Delphi method. Our results show that the topics and issues covered are almost the same for the case of APT and that of traditional threats; however, the focal issues worth paying attention to and the suggested way in rethinking of the whole InfoSec strategy are obviously different, from the very nature. In particular, this research finds that the most important five items in APT scenarios are: information exchange (Email), network access control (network segmentation), malicious codes and mobile codes prevention (endpoint security), drills and review of social engineering prevention, and network security management (firewall and intrusion detection). It is suggested that corporate should examine the current InfoSec policies and re-evaluate the risk with technical standards.
author2 Chien-Liang Kuo
author_facet Chien-Liang Kuo
Hsiang Chi
季祥
author Hsiang Chi
季祥
spellingShingle Hsiang Chi
季祥
A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
author_sort Hsiang Chi
title A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
title_short A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
title_full A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
title_fullStr A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
title_full_unstemmed A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
title_sort study on the impacts of advanced persistent threat (apt) on corporate information security policy
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/10868642773761817807
work_keys_str_mv AT hsiangchi astudyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy
AT jìxiáng astudyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy
AT hsiangchi aptgōngjīduìqǐyèzīānzhèngcèzhīyǐngxiǎng
AT jìxiáng aptgōngjīduìqǐyèzīānzhèngcèzhīyǐngxiǎng
AT hsiangchi studyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy
AT jìxiáng studyontheimpactsofadvancedpersistentthreataptoncorporateinformationsecuritypolicy
_version_ 1718193636446830592