English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 47249/51115 (92%)
造訪人次 : 14333829      線上人數 : 660
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/20284


    題名: 資訊安全事件自動觸發機制之建立
    作者: 呂寅甲
    貢獻者: 資訊安全產業研發碩士專班
    關鍵詞: 資安攻擊
    門檻值
    資訊安全管理系統
    資訊安全監控中心
    日期: 2009
    上傳時間: 2011-11-07 15:24:55 (UTC+8)
    摘要: 面對日新月異且日趨頻繁的資訊安全攻擊事件,企業組織如何維持日常的營運作業、保護資訊安全以及提供正常服務,已是一大重要課題。企業組織利用資訊安全設備監控各類資訊安全攻擊事件的肇因與威脅,再遵循其訂定之資訊安全管理系統之政策與應變處理標準作業程序,據以要求相關資訊安全管理人員妥善處置,以期企業資訊作業環境符合資訊安全規範。
    在此繁複流程中,包括前段過濾安全攻擊事件及後段對安全政擊事件的處理程序,有效率的解決資訊安全攻擊事件必須仰賴前段對安全攻擊事件之判斷與過濾,此一判斷程序有一重大控制點,即為設定「關聯規則的門檻值」。若是管理系統中關聯規則的門檻值設定不良,將造成過多的資訊安全攻擊案件,進而使資訊安全管理人員疲於奔命,反之若是過少的資訊安全攻擊案件,則讓資訊安全管理人員無法掌握相關系統的即時狀態。
    本論文透過簡單的實作,針對資訊安全攻擊案件的產生,在客觀與務實的角度下,經過模擬測試,歸納實驗數據提出自動化的合理門檻值,此數據可作為資訊安全案件通報之參考,使企業組織能快速且有效率的解決資訊安全之相關問題。

    Organizations and businesses are becoming reliant on the information system for their daily business activities nowadays, which increases these companies risk of exposure to security attacks. Therefore the prevention of our information assets while maintaining business operation stability and providing continual services is a significant issue for many organizations or companies. Companies implement the measures to monitor and manage security incidents, finding out what the threats and causes of security attacks malicious are. For information within the companies operating environments remains secure and the response processes the specialists adapted are in line with the security policy, the specialists of security operation centers comply with security policy to adopt appropriate actions when they receive the warning of security attacks or suffer from incidents.
    Information security management (“ISM”) involves complex processes, encompassing the security incidents judgment and filtration in the front-end and security actions taken in the back-end of the ISM procedure. Prevention is better than cure, the key to stopping security attacks relies on the front-end judgment and filter with the most important control point being the threshold value of collection rule1. If the threshold value is not set out appropriately, specialists are either weighted down by processing the problems of security attacks or can not control the real-time status of the information environment, which means companies will suffer a high-risk of security problem.
    Through observation of current practice, this study aims to objectively summarize reasonable values of threshold that result from data gleaned and then proposes automotive threshold values. The values are the reference for security incident reporting. A Company could refer to these values to set up their threshold values so that could manage and solve its security incidents immediately and efficiently.
    顯示於類別:[資訊工程學系] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML433檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋