The Discussion about Governing Object of the R.O.C Information Communication Security Management Act

碩士 === 嶺東科技大學 === 財經法律研究所 === 107 === Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the de...

Full description

Bibliographic Details
Main Authors: CHEN, SHIH-HONG, 陳仕弘
Other Authors: TSENG, SHENG-CHEN
Format: Others
Language:zh-TW
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/vabvhg
id ndltd-TW-107LTC00308003
record_format oai_dc
spelling ndltd-TW-107LTC003080032019-06-27T05:42:39Z http://ndltd.ncl.edu.tw/handle/vabvhg The Discussion about Governing Object of the R.O.C Information Communication Security Management Act 我國資通安全管理法之探討-以規範對象為中心 CHEN, SHIH-HONG 陳仕弘 碩士 嶺東科技大學 財經法律研究所 107 Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the development of cloud services and the internet, along with the security incidents and the frequent transmission of critical infrastructure, numerous damages have been caused. The Information Communication Security Management Act of R.O.C. was passed to third reading in May 2018, and officially implemented it on Jan, 1st, 2019. This article will introduce the legislative trends of the EU, the United States, Germany, Japan and other countries. it also discusses issues such as the normative objects, leading organs, handling of incidents, and penalties. How to prevent critical infrastructure against all kinds of attacks and threats, and the governments has constructed the entire information security protection strategy as the primary response plan. Finally, conclusions and suggestions are made. TSENG, SHENG-CHEN 曾勝珍 2019 學位論文 ; thesis 121 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 嶺東科技大學 === 財經法律研究所 === 107 === Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the development of cloud services and the internet, along with the security incidents and the frequent transmission of critical infrastructure, numerous damages have been caused. The Information Communication Security Management Act of R.O.C. was passed to third reading in May 2018, and officially implemented it on Jan, 1st, 2019. This article will introduce the legislative trends of the EU, the United States, Germany, Japan and other countries. it also discusses issues such as the normative objects, leading organs, handling of incidents, and penalties. How to prevent critical infrastructure against all kinds of attacks and threats, and the governments has constructed the entire information security protection strategy as the primary response plan. Finally, conclusions and suggestions are made.
author2 TSENG, SHENG-CHEN
author_facet TSENG, SHENG-CHEN
CHEN, SHIH-HONG
陳仕弘
author CHEN, SHIH-HONG
陳仕弘
spellingShingle CHEN, SHIH-HONG
陳仕弘
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
author_sort CHEN, SHIH-HONG
title The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
title_short The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
title_full The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
title_fullStr The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
title_full_unstemmed The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
title_sort discussion about governing object of the r.o.c information communication security management act
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/vabvhg
work_keys_str_mv AT chenshihhong thediscussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact
AT chénshìhóng thediscussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact
AT chenshihhong wǒguózītōngānquánguǎnlǐfǎzhītàntǎoyǐguīfànduìxiàngwèizhōngxīn
AT chénshìhóng wǒguózītōngānquánguǎnlǐfǎzhītàntǎoyǐguīfànduìxiàngwèizhōngxīn
AT chenshihhong discussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact
AT chénshìhóng discussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact
_version_ 1719212972209864704