How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry
碩士 === 輔仁大學 === 資訊管理學系碩士在職專班 === 107 === For the various practical behaviors of corporate transactions, most of the behaviors are completed through the strict protocol on Websites. Such fast and rigorous corporate behavior also gives illegal access to fraudulent funds, funds for terrorist attacks, p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/y5tv55 |
id |
ndltd-TW-107FJU01396026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107FJU013960262019-08-06T03:36:06Z http://ndltd.ncl.edu.tw/handle/y5tv55 How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry 企業如何有效偵測並快速掌握資訊安全事件-以某銀行為例 Yeh, Kuang-Shun 葉光舜 碩士 輔仁大學 資訊管理學系碩士在職專班 107 For the various practical behaviors of corporate transactions, most of the behaviors are completed through the strict protocol on Websites. Such fast and rigorous corporate behavior also gives illegal access to fraudulent funds, funds for terrorist attacks, patents of other organizations, etc. to carry out various types of theft through the holes of information security system or related administrators within the enterprise. Serious theft or destructive incidents may result in the theft of cash from ATMs in the banking industry; even more serious, secrets of the country are stolen as well as the lives and property of people are destroyed. This study first analyzes whether there are risks in the daily operation of the company: that is, 1. Import the log collection system, and establish rules by collecting and retrieving logs and machine data; 2. Judging abnormal account behavior, monitoring and monitoring services through data-oriented analysis, operational threat information and detection of network attacks and internal threats to facilitate the determination of whether it is a hacker or daily normal maintenance; 3. Labor cost-effectiveness of record collection system. Then, empirical data of the case study is imported into the above steps, and analysis results show that tracking and reliability of the operational server and terminal host information security have positive and significant effects. Finally, implications and guideline principles of managerial analysis can be used as an important reference for enterprises to import information security logs in the future. Lee, Jiunn-Min 李俊民 2019 學位論文 ; thesis 61 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 輔仁大學 === 資訊管理學系碩士在職專班 === 107 === For the various practical behaviors of corporate transactions, most of the behaviors are completed through the strict protocol on Websites. Such fast and rigorous corporate behavior also gives illegal access to fraudulent funds, funds for terrorist attacks, patents of other organizations, etc. to carry out various types of theft through the holes of information security system or related administrators within the enterprise. Serious theft or destructive incidents may result in the theft of cash from ATMs in the banking industry; even more serious, secrets of the country are stolen as well as the lives and property of people are destroyed.
This study first analyzes whether there are risks in the daily operation of the company: that is, 1. Import the log collection system, and establish rules by collecting and retrieving logs and machine data; 2. Judging abnormal account behavior, monitoring and monitoring services through data-oriented analysis, operational threat information and detection of network attacks and internal threats to facilitate the determination of whether it is a hacker or daily normal maintenance; 3. Labor cost-effectiveness of record collection system. Then, empirical data of the case study is imported into the above steps, and analysis results show that tracking and reliability of the operational server and terminal host information security have positive and significant effects. Finally, implications and guideline principles of managerial analysis can be used as an important reference for enterprises to import information security logs in the future.
|
author2 |
Lee, Jiunn-Min |
author_facet |
Lee, Jiunn-Min Yeh, Kuang-Shun 葉光舜 |
author |
Yeh, Kuang-Shun 葉光舜 |
spellingShingle |
Yeh, Kuang-Shun 葉光舜 How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
author_sort |
Yeh, Kuang-Shun |
title |
How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
title_short |
How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
title_full |
How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
title_fullStr |
How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
title_full_unstemmed |
How can companies effectively detect and quickly recognize and report the security incidents?-A case study from banking industry |
title_sort |
how can companies effectively detect and quickly recognize and report the security incidents?-a case study from banking industry |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/y5tv55 |
work_keys_str_mv |
AT yehkuangshun howcancompanieseffectivelydetectandquicklyrecognizeandreportthesecurityincidentsacasestudyfrombankingindustry AT yèguāngshùn howcancompanieseffectivelydetectandquicklyrecognizeandreportthesecurityincidentsacasestudyfrombankingindustry AT yehkuangshun qǐyèrúhéyǒuxiàozhēncèbìngkuàisùzhǎngwòzīxùnānquánshìjiànyǐmǒuyínxíngwèilì AT yèguāngshùn qǐyèrúhéyǒuxiàozhēncèbìngkuàisùzhǎngwòzīxùnānquánshìjiànyǐmǒuyínxíngwèilì |
_version_ |
1719233228115542016 |