A Information Security Risk Analysis of BYOD for Cloud Storage Service
碩士 === 華梵大學 === 資訊管理學系碩士班 === 103 === As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/68520527310171268332 |
id |
ndltd-TW-103HCHT0396004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103HCHT03960042016-08-14T04:10:35Z http://ndltd.ncl.edu.tw/handle/68520527310171268332 A Information Security Risk Analysis of BYOD for Cloud Storage Service 自攜設備辦公的雲端儲存服務資安風險分析之研究 Chen, Yin-Hsi 陳胤羲 碩士 華梵大學 資訊管理學系碩士班 103 As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts data collection and literature review on iOS-based Bring-Your-Own-Device(BYOD) and cloud storage service, and preforms difference analysis and comparison on ISO27001 infrastructure to increase information security management items of evaluation criteria. Later, it distinguishes 5 main dimensions (management strategy, sustainable operation, technology security, operating security and threat control) and 26 items of evaluation criteria after analyzing evaluation criteria and dimensions through group interview of experts (Delphi questionnaire). At last, the entrepreneurs and experts conduct Analytic Hierarchy Process (AHP) to find out priorities and key factors. The research results show the information security criteria in the top ten weights are “Event Identification, Analysis and Review”, “Information Backup”, “User Device Identification and Authentication”, “Obedience to Laws and Regulations of Various Countries”, “Device Loss and Theft Protection” and “Precaution against Commercial Espionage”. In addition, the entrepreneurs focus on management strategy and sustainable operation, the experts besides pay attention to technology security and operating security. Therefore, it’s necessary for enterprises that have introduced ISO27001 can use these criteria to reinforce themselves. In conclusion, it hopes the research results can be used as a reference for information security risk analysis of cloud storage service that enterprises import into iOS-based BYOD in the future. Chun-Te Chen 陳俊德 2015 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 103 === As the Internet matures, enterprises worldwide allow employees to bring their own devices to access cloud storage service to satisfy market demand and improve their work efficiency, which casts doubts on enterprises ’information security. This research conducts data collection and literature review on iOS-based Bring-Your-Own-Device(BYOD) and cloud storage service, and preforms difference analysis and comparison on ISO27001 infrastructure to increase information security management items of evaluation criteria. Later, it distinguishes 5 main dimensions (management strategy, sustainable operation, technology security, operating security and threat control) and 26 items of evaluation criteria after analyzing evaluation criteria and dimensions through group interview of experts (Delphi questionnaire). At last, the entrepreneurs and experts conduct Analytic Hierarchy Process (AHP) to find out priorities and key factors. The research results show the information security criteria in the top ten weights are “Event Identification, Analysis and Review”, “Information Backup”, “User Device Identification and Authentication”, “Obedience to Laws and Regulations of Various Countries”, “Device Loss and Theft Protection” and “Precaution against Commercial Espionage”. In addition, the entrepreneurs focus on management strategy and sustainable operation, the experts besides pay attention to technology security and operating security. Therefore, it’s necessary for enterprises that have introduced ISO27001 can use these criteria to reinforce themselves. In conclusion, it hopes the research results can be used as a reference for information security risk analysis of cloud storage service that enterprises import into iOS-based BYOD in the future.
|
author2 |
Chun-Te Chen |
author_facet |
Chun-Te Chen Chen, Yin-Hsi 陳胤羲 |
author |
Chen, Yin-Hsi 陳胤羲 |
spellingShingle |
Chen, Yin-Hsi 陳胤羲 A Information Security Risk Analysis of BYOD for Cloud Storage Service |
author_sort |
Chen, Yin-Hsi |
title |
A Information Security Risk Analysis of BYOD for Cloud Storage Service |
title_short |
A Information Security Risk Analysis of BYOD for Cloud Storage Service |
title_full |
A Information Security Risk Analysis of BYOD for Cloud Storage Service |
title_fullStr |
A Information Security Risk Analysis of BYOD for Cloud Storage Service |
title_full_unstemmed |
A Information Security Risk Analysis of BYOD for Cloud Storage Service |
title_sort |
information security risk analysis of byod for cloud storage service |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/68520527310171268332 |
work_keys_str_mv |
AT chenyinhsi ainformationsecurityriskanalysisofbyodforcloudstorageservice AT chényìnxī ainformationsecurityriskanalysisofbyodforcloudstorageservice AT chenyinhsi zìxiéshèbèibàngōngdeyúnduānchǔcúnfúwùzīānfēngxiǎnfēnxīzhīyánjiū AT chényìnxī zìxiéshèbèibàngōngdeyúnduānchǔcúnfúwùzīānfēngxiǎnfēnxīzhīyánjiū AT chenyinhsi informationsecurityriskanalysisofbyodforcloudstorageservice AT chényìnxī informationsecurityriskanalysisofbyodforcloudstorageservice |
_version_ |
1718375439104212992 |