English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46962/50828 (92%)
造訪人次 : 12409753      線上人數 : 1320
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/25486


    題名: 運用‎ITIL‎服務管理建置納入個資管理之‎ISMS‎於中小企業
    Implement the ISMS integrating Personal Data Management Based on ITIL ‎Service Management in Small and Medium Enterprises
    作者: 李仲捷
    Chieh, Lee Chung
    貢獻者: 資訊安全產業研發碩士專班
    關鍵詞: 資訊技術基礎架構庫
    資訊技術服務管理
    國際資訊服務管理標準
    資訊安全管理系統
    國際資訊安全標準
    個人資訊管理系統
    個人資訊管理標準
    個資法
    中小企業
    ITIL
    ITSM
    ISO 20000
    ISMS
    ISO 27001
    PIMS
    BS 10012
    Personal Information Protection Act
    Small and Medium Enterprises
    日期: 2013-06
    上傳時間: 2013-10-08 14:43:13 (UTC+8)
    摘要: 由於高度的資訊化、數位化,不論企業規模大小,均仰賴資訊化提升效益,故資訊安全在目前已成為重要的議題。但在此同時電腦犯罪者亦不斷的發展技術,竊取資料,破壞資訊系統或環境等新聞層出不窮。然而,中小型企業因預算或經濟效益考量,大多並無導入安全認證。面對中小企業的資訊安全需求與管理,本論文希望透過ITILV3的方法論將企業的IT服務與安全標準結合,規劃符合中小企業的整合式的ISMS,且有效運用這些控制措施達到資訊安全的目的。
    將ISO 27001、BS 10012、個人資料保護法條文與控制目標及措施進行比對分析,產生出整合性的安全需求。同時將ISO 27001與ITILV3進行分析研究,在ITILV3的管理流程中如何與ISO 27001的控制措施結合,最終提出一種整合性ISMS架構,將ISMS以一種服務的概念應用於企業。
    整合性ISMS有四個不同階段,透過實際個案,本研究完整呈現整個建置過程所需的要素,展示如何從企業政策到IT策略,從企業流程到IT服務到IT系統的詳細規劃。藉由此建置過程可提供企業自行建置ISMS的典範,這也是本研究的最終目的。
    Due to highly informationization and digitalization, enterprises, regardless of the size, rely on the informationization to improve their benefits. Information security has become an important topic at the present day. However, computer criminals also continuously develop their techniques at the same time. News relating to the data stealing, destruction of information systems or environment emerge in an endless stream. Most small and medium-sized enterprises do not implement security certificates due to considerations of budget or economic effects. Facing the demand and management of information security of small and medium-sized enterprises, This thesis intends to, through ITILV3 methodology, integrate the IT services and security standards of enterprises, and plan the integrated ISMS conforming to the requirements of small and medium-sized enterprises in order to effectively make use of these control measures to achieve the purpose of information security.
    ISO 27001, BS 10012, and clauses of Personal Information Protection Act are also compared and analyzed with control objects and measures, which results in the integrated security requirements. At the same time, ISO 27001 and ITILV3 are also analyzed and studied on how to combine the management procedures of ITILV3 with the control measures of ISO 27001. An integrated ISMS structure is ultimately addressed and applied in the enterprises as a service concept.
    There are four different stages of integrated ISMS. This research, by actual cases, presents intactly the required elements of entire establishment procedure. This research also reveals how it works from the policies of an enterprise to IT strategies, and from the procedures of a venture to IT services, and even more, to detailed plans of IT systems. This establishment procedure will provide an example to enterprises of establishing ISMS by themselves, which is also the ultimate purpose of this research.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML260檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋