A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy

碩士 === 國防大學 === 資訊管理學系 === 106 === With the development of the times, the improvement of science and technology, as well as common uses of electronics in daily life, we rely more on information technology that causes rampant hackers and raging computer viruses. In order that, domestic and foreign go...

Full description

Bibliographic Details
Main Authors: LU,MING-YI, 呂明逸
Other Authors: FU,CHEN-HUA
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/ruu3vu
id ndltd-TW-106NDU00654008
record_format oai_dc
spelling ndltd-TW-106NDU006540082019-05-16T00:00:45Z http://ndltd.ncl.edu.tw/handle/ruu3vu A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy 導入ISO27001資訊安全管理之可行性研究-以國軍某軍事院校為例 LU,MING-YI 呂明逸 碩士 國防大學 資訊管理學系 106 With the development of the times, the improvement of science and technology, as well as common uses of electronics in daily life, we rely more on information technology that causes rampant hackers and raging computer viruses. In order that, domestic and foreign government, military academies and private enterprises suffer. We have to strengthen the information security system and enhance the security level of information communication so that we are able to protect the organs and personal information from a variety of security threats at home and abroad. This study is mainly used in the 14 ISO 27001 control fields of 35 control objectives and 114 control measures, through expert interviews and the questionnaire, to explore the problems and improvement of security management military academies may face, through the ISO 27001 Verification program, to establish the best level structure, with analyzing level method, summarized into the ISO 27001 researching structure of information security management, we can improve abilities of risk control. The findings show that "information security policy" is the most important factor that should be listed as the most important factor in the feasibility of introducing information security for a certain military academy in the national army. The order of followings is "information security organization" and "asset management."After verification, the continuing verification of the audit organization and the continuous updating of ISO 27001 will ensure that the school units keep abreast of the latest information and continue to protect the school units. The operation of the information security management system and the ISO 27001 verification are tantamount to a security badge, and users can easily tell which organizations are certified and trusted. As users become more cautious of cybersecurity loopholes, they will start to seek specific security, and the operation of the information security management system and ISO 27001 certification will provide the confidence they need. FU,CHEN-HUA HO,SHENG-CHIH 傅振華 賀盛志 2018 學位論文 ; thesis 65 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學 === 資訊管理學系 === 106 === With the development of the times, the improvement of science and technology, as well as common uses of electronics in daily life, we rely more on information technology that causes rampant hackers and raging computer viruses. In order that, domestic and foreign government, military academies and private enterprises suffer. We have to strengthen the information security system and enhance the security level of information communication so that we are able to protect the organs and personal information from a variety of security threats at home and abroad. This study is mainly used in the 14 ISO 27001 control fields of 35 control objectives and 114 control measures, through expert interviews and the questionnaire, to explore the problems and improvement of security management military academies may face, through the ISO 27001 Verification program, to establish the best level structure, with analyzing level method, summarized into the ISO 27001 researching structure of information security management, we can improve abilities of risk control. The findings show that "information security policy" is the most important factor that should be listed as the most important factor in the feasibility of introducing information security for a certain military academy in the national army. The order of followings is "information security organization" and "asset management."After verification, the continuing verification of the audit organization and the continuous updating of ISO 27001 will ensure that the school units keep abreast of the latest information and continue to protect the school units. The operation of the information security management system and the ISO 27001 verification are tantamount to a security badge, and users can easily tell which organizations are certified and trusted. As users become more cautious of cybersecurity loopholes, they will start to seek specific security, and the operation of the information security management system and ISO 27001 certification will provide the confidence they need.
author2 FU,CHEN-HUA
author_facet FU,CHEN-HUA
LU,MING-YI
呂明逸
author LU,MING-YI
呂明逸
spellingShingle LU,MING-YI
呂明逸
A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
author_sort LU,MING-YI
title A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
title_short A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
title_full A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
title_fullStr A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
title_full_unstemmed A Study on Feasibility of Information Security Management Implementation with ISO27001-a Case of One Military Academy
title_sort study on feasibility of information security management implementation with iso27001-a case of one military academy
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/ruu3vu
work_keys_str_mv AT lumingyi astudyonfeasibilityofinformationsecuritymanagementimplementationwithiso27001acaseofonemilitaryacademy
AT lǚmíngyì astudyonfeasibilityofinformationsecuritymanagementimplementationwithiso27001acaseofonemilitaryacademy
AT lumingyi dǎorùiso27001zīxùnānquánguǎnlǐzhīkěxíngxìngyánjiūyǐguójūnmǒujūnshìyuànxiàowèilì
AT lǚmíngyì dǎorùiso27001zīxùnānquánguǎnlǐzhīkěxíngxìngyánjiūyǐguójūnmǒujūnshìyuànxiàowèilì
AT lumingyi studyonfeasibilityofinformationsecuritymanagementimplementationwithiso27001acaseofonemilitaryacademy
AT lǚmíngyì studyonfeasibilityofinformationsecuritymanagementimplementationwithiso27001acaseofonemilitaryacademy
_version_ 1719158722166521856