The Discussion about Governing Object of the R.O.C Information Communication Security Management Act
碩士 === 嶺東科技大學 === 財經法律研究所 === 107 === Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the de...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/vabvhg |
id |
ndltd-TW-107LTC00308003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107LTC003080032019-06-27T05:42:39Z http://ndltd.ncl.edu.tw/handle/vabvhg The Discussion about Governing Object of the R.O.C Information Communication Security Management Act 我國資通安全管理法之探討-以規範對象為中心 CHEN, SHIH-HONG 陳仕弘 碩士 嶺東科技大學 財經法律研究所 107 Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the development of cloud services and the internet, along with the security incidents and the frequent transmission of critical infrastructure, numerous damages have been caused. The Information Communication Security Management Act of R.O.C. was passed to third reading in May 2018, and officially implemented it on Jan, 1st, 2019. This article will introduce the legislative trends of the EU, the United States, Germany, Japan and other countries. it also discusses issues such as the normative objects, leading organs, handling of incidents, and penalties. How to prevent critical infrastructure against all kinds of attacks and threats, and the governments has constructed the entire information security protection strategy as the primary response plan. Finally, conclusions and suggestions are made. TSENG, SHENG-CHEN 曾勝珍 2019 學位論文 ; thesis 121 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 嶺東科技大學 === 財經法律研究所 === 107 === Since the rapid network development from information technology innovation, the trade of various countries has spread to the whole world through the Internet, it has also brought security problems and threats. With the proliferation of mobile devices, the development of cloud services and the internet, along with the security incidents and the frequent transmission of critical infrastructure, numerous damages have been caused. The Information Communication Security Management Act of R.O.C. was passed to third reading in May 2018, and officially implemented it on Jan, 1st, 2019. This article will introduce the legislative trends of the EU, the United States, Germany, Japan and other countries. it also discusses issues such as the normative objects, leading organs, handling of incidents, and penalties. How to prevent critical infrastructure against all kinds of attacks and threats, and the governments has constructed the entire information security protection strategy as the primary response plan. Finally, conclusions and suggestions are made.
|
author2 |
TSENG, SHENG-CHEN |
author_facet |
TSENG, SHENG-CHEN CHEN, SHIH-HONG 陳仕弘 |
author |
CHEN, SHIH-HONG 陳仕弘 |
spellingShingle |
CHEN, SHIH-HONG 陳仕弘 The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
author_sort |
CHEN, SHIH-HONG |
title |
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
title_short |
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
title_full |
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
title_fullStr |
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
title_full_unstemmed |
The Discussion about Governing Object of the R.O.C Information Communication Security Management Act |
title_sort |
discussion about governing object of the r.o.c information communication security management act |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/vabvhg |
work_keys_str_mv |
AT chenshihhong thediscussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact AT chénshìhóng thediscussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact AT chenshihhong wǒguózītōngānquánguǎnlǐfǎzhītàntǎoyǐguīfànduìxiàngwèizhōngxīn AT chénshìhóng wǒguózītōngānquánguǎnlǐfǎzhītàntǎoyǐguīfànduìxiàngwèizhōngxīn AT chenshihhong discussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact AT chénshìhóng discussionaboutgoverningobjectoftherocinformationcommunicationsecuritymanagementact |
_version_ |
1719212972209864704 |