A Information Security Risk Analysis of BYOD for Cloud Storage Service

碩士 === 華梵大學 === 資訊管理學系碩士班 === 103 === As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts...

Full description

Bibliographic Details
Main Authors: Chen, Yin-Hsi, 陳胤羲
Other Authors: Chun-Te Chen
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/68520527310171268332
id ndltd-TW-103HCHT0396004
record_format oai_dc
spelling ndltd-TW-103HCHT03960042016-08-14T04:10:35Z http://ndltd.ncl.edu.tw/handle/68520527310171268332 A Information Security Risk Analysis of BYOD for Cloud Storage Service 自攜設備辦公的雲端儲存服務資安風險分析之研究 Chen, Yin-Hsi 陳胤羲 碩士 華梵大學 資訊管理學系碩士班 103 As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts data collection and literature review on iOS-based Bring-Your-Own-Device(BYOD) and cloud storage service, and preforms difference analysis and comparison on ISO27001 infrastructure to increase information security management items of evaluation criteria. Later, it distinguishes 5 main dimensions (management strategy, sustainable operation, technology security, operating security and threat control) and 26 items of evaluation criteria after analyzing evaluation criteria and dimensions through group interview of experts (Delphi questionnaire). At last, the entrepreneurs and experts conduct Analytic Hierarchy Process (AHP) to find out priorities and key factors. The research results show the information security criteria in the top ten weights are “Event Identification, Analysis and Review”, “Information Backup”, “User Device Identification and Authentication”, “Obedience to Laws and Regulations of Various Countries”, “Device Loss and Theft Protection” and “Precaution against Commercial Espionage”. In addition, the entrepreneurs focus on management strategy and sustainable operation, the experts besides pay attention to technology security and operating security. Therefore, it’s necessary for enterprises that have introduced ISO27001 can use these criteria to reinforce themselves. In conclusion, it hopes the research results can be used as a reference for information security risk analysis of cloud storage service that enterprises import into iOS-based BYOD in the future. Chun-Te Chen 陳俊德 2015 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 103 === As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts data collection and literature review on iOS-based Bring-Your-Own-Device(BYOD) and cloud storage service, and preforms difference analysis and comparison on ISO27001 infrastructure to increase information security management items of evaluation criteria. Later, it distinguishes 5 main dimensions (management strategy, sustainable operation, technology security, operating security and threat control) and 26 items of evaluation criteria after analyzing evaluation criteria and dimensions through group interview of experts (Delphi questionnaire). At last, the entrepreneurs and experts conduct Analytic Hierarchy Process (AHP) to find out priorities and key factors. The research results show the information security criteria in the top ten weights are “Event Identification, Analysis and Review”, “Information Backup”, “User Device Identification and Authentication”, “Obedience to Laws and Regulations of Various Countries”, “Device Loss and Theft Protection” and “Precaution against Commercial Espionage”. In addition, the entrepreneurs focus on management strategy and sustainable operation, the experts besides pay attention to technology security and operating security. Therefore, it’s necessary for enterprises that have introduced ISO27001 can use these criteria to reinforce themselves. In conclusion, it hopes the research results can be used as a reference for information security risk analysis of cloud storage service that enterprises import into iOS-based BYOD in the future.
author2 Chun-Te Chen
author_facet Chun-Te Chen
Chen, Yin-Hsi
陳胤羲
author Chen, Yin-Hsi
陳胤羲
spellingShingle Chen, Yin-Hsi
陳胤羲
A Information Security Risk Analysis of BYOD for Cloud Storage Service
author_sort Chen, Yin-Hsi
title A Information Security Risk Analysis of BYOD for Cloud Storage Service
title_short A Information Security Risk Analysis of BYOD for Cloud Storage Service
title_full A Information Security Risk Analysis of BYOD for Cloud Storage Service
title_fullStr A Information Security Risk Analysis of BYOD for Cloud Storage Service
title_full_unstemmed A Information Security Risk Analysis of BYOD for Cloud Storage Service
title_sort information security risk analysis of byod for cloud storage service
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/68520527310171268332
work_keys_str_mv AT chenyinhsi ainformationsecurityriskanalysisofbyodforcloudstorageservice
AT chényìnxī ainformationsecurityriskanalysisofbyodforcloudstorageservice
AT chenyinhsi zìxiéshèbèibàngōngdeyúnduānchǔcúnfúwùzīānfēngxiǎnfēnxīzhīyánjiū
AT chényìnxī zìxiéshèbèibàngōngdeyúnduānchǔcúnfúwùzīānfēngxiǎnfēnxīzhīyánjiū
AT chenyinhsi informationsecurityriskanalysisofbyodforcloudstorageservice
AT chényìnxī informationsecurityriskanalysisofbyodforcloudstorageservice
_version_ 1718375439104212992