文化大學機構典藏 CCUR:Item 987654321/28184
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47126/50992 (92%)
Visitors : 13860284      Online Users : 251
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/28184


    题名: APT攻擊對企業資安政策之影響
    A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy
    作者: 季祥
    贡献者: 資訊管理學系碩士在職專班
    关键词: 進階持續性滲透攻擊
    資安策略
    關鍵要素
    德菲法
    日期: 2014
    上传时间: 2014-09-25 15:07:30 (UTC+8)
    摘要: 駭客攻擊為企業因應網路時代的重要課題;尤其,當資訊安全威脅典範轉移(paradigm shift)成鎖定特定標的之進階持續性滲透攻擊(Advanced Persistent Threat, APT)模式,使得傳統資安防護方式恐不再作為因應這些高度複雜的威脅時,如何設計安全政策或原則,成為至關重要但卻懸而未決的問題。
    為協助政府與大型企業因應此一挑戰,本研究先透過文獻分析,整合企業資安策略、資安標準議題、資安產品架構及解決方案選擇要素、資安服務提供商,與資安解決方案業者之觀點,提出五構面、29項因應APT的資安策略與議題。接著,再透過德菲法對32位專家進行三輪的意見調查。研究結果發現,專家認為,在APT攻擊情境下,企業應注意的面向與議題,表現上和因應傳統資安與資訊治理的差異無幾,但實際上,在重心與思維上,則存有顯著差異。尤其,本研究發現,APT情境下最重要的五個項目為:資訊交換(電子郵件)、網路存取控制(網路隔離)、防範惡意碼與行動碼(端點安全)、社交工程演練及檢討、網路的安全管理(防火牆、入侵偵測)。因此,本研究建議,企業應結合技術面的標準,重新檢視目前的資安政策,並進行風險權重評估。
    Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges.
    To help governments and enterprises react to the challenges mentioned above, this research propose a five-dimensional InfoSec strategy framework covering 29 items through literature review. Furthermore, to validate the propose framework and to identify the key issues, 32 InfoSec experts are invited to participate the three-round survey through Delphi method. Our results show that the topics and issues covered are almost the same for the case of APT and that of traditional threats; however, the focal issues worth paying attention to and the suggested way in rethinking of the whole InfoSec strategy are obviously different, from the very nature. In particular, this research finds that the most important five items in APT scenarios are: information exchange (Email), network access control (network segmentation), malicious codes and mobile codes prevention (endpoint security), drills and review of social engineering prevention, and network security management (firewall and intrusion detection). It is suggested that corporate should examine the current InfoSec policies and re-evaluate the risk with technical standards.
    显示于类别:[Department of Information Management & Graduate Institute of Information Management] Thesis

    文件中的档案:

    档案 描述 大小格式浏览次数
    fb140925150642.pdf9724KbAdobe PDF2483检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©  2006-2025  - 回馈