A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor
碩士 === 德明財經科技大學 === 資訊管理系 === 105 === The enterprise operation pattern transformation and expansion by way of information technology has also indirectly caused the war pattern evolution from the point-line-plane pattern to the paralytic offence and defense in network space. Therefore, the informatio...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/jzsu4n |
id |
ndltd-TW-105TMU00853010 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105TMU008530102019-05-15T23:17:17Z http://ndltd.ncl.edu.tw/handle/jzsu4n A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor 分析軍事機構導入ISOIEC 27001存取控制之研究:管理者與執行者之觀點 LAI,BO-ZHANG 賴柏彰 碩士 德明財經科技大學 資訊管理系 105 The enterprise operation pattern transformation and expansion by way of information technology has also indirectly caused the war pattern evolution from the point-line-plane pattern to the paralytic offence and defense in network space. Therefore, the information security has become an important and key subject in constructing the dependable fighting capacity for defense by the defense force, among which the “access control” is a most frequently confronted information security threat. Based on this, this study explores the importing of access control measures into military agencies based on the ISO 27001 information security standards. The study results show that the “system and application access control” is a dimension requiring the most attention. Both the managers and executives regard the “access control of program code” as a key measure of the highest importance under this dimension. In addition, the study results also show that there are still the conflict between managers and executives on the priority order of importing the measures under the dimensions of “user’s access management and responsibilities” and “operating requirements of access control”. It is therefore recommended that the defense unit should first import the access control measures of high-degree consensus so as to gather the participants’ morale and reduce the passive resistance. HAN,WEN-MING 韓文銘 2017 學位論文 ; thesis 95 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 德明財經科技大學 === 資訊管理系 === 105 === The enterprise operation pattern transformation and expansion by way of information technology has also indirectly caused the war pattern evolution from the point-line-plane pattern to the paralytic offence and defense in network space. Therefore, the information security has become an important and key subject in constructing the dependable fighting capacity for defense by the defense force, among which the “access control” is a most frequently confronted information security threat. Based on this, this study explores the importing of access control measures into military agencies based on the ISO 27001 information security standards. The study results show that the “system and application access control” is a dimension requiring the most attention. Both the managers and executives regard the “access control of program code” as a key measure of the highest importance under this dimension. In addition, the study results also show that there are still the conflict between managers and executives on the priority order of importing the measures under the dimensions of “user’s access management and responsibilities” and “operating requirements of access control”. It is therefore recommended that the defense unit should first import the access control measures of high-degree consensus so as to gather the participants’ morale and reduce the passive resistance.
|
author2 |
HAN,WEN-MING |
author_facet |
HAN,WEN-MING LAI,BO-ZHANG 賴柏彰 |
author |
LAI,BO-ZHANG 賴柏彰 |
spellingShingle |
LAI,BO-ZHANG 賴柏彰 A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
author_sort |
LAI,BO-ZHANG |
title |
A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
title_short |
A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
title_full |
A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
title_fullStr |
A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
title_full_unstemmed |
A Study on Access Control for ISO/IEC 27001 Implementation to Military Organizations:Perspectives of Administrator and Executor |
title_sort |
study on access control for iso/iec 27001 implementation to military organizations:perspectives of administrator and executor |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/jzsu4n |
work_keys_str_mv |
AT laibozhang astudyonaccesscontrolforisoiec27001implementationtomilitaryorganizationsperspectivesofadministratorandexecutor AT làibǎizhāng astudyonaccesscontrolforisoiec27001implementationtomilitaryorganizationsperspectivesofadministratorandexecutor AT laibozhang fēnxījūnshìjīgòudǎorùisoiec27001cúnqǔkòngzhìzhīyánjiūguǎnlǐzhěyǔzhíxíngzhězhīguāndiǎn AT làibǎizhāng fēnxījūnshìjīgòudǎorùisoiec27001cúnqǔkòngzhìzhīyánjiūguǎnlǐzhěyǔzhíxíngzhězhīguāndiǎn AT laibozhang studyonaccesscontrolforisoiec27001implementationtomilitaryorganizationsperspectivesofadministratorandexecutor AT làibǎizhāng studyonaccesscontrolforisoiec27001implementationtomilitaryorganizationsperspectivesofadministratorandexecutor |
_version_ |
1719144695440867328 |