English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46962/50828 (92%)
造訪人次 : 12409812      線上人數 : 1320
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/49290


    題名: 基於資通安全管理法適用對象之資安人才培育探討
    The Training of Cybersecurity Talents Based on the Applicable Objects of the Cyber Security Management Law
    作者: 方耀宇
    貢獻者: 資訊管理學系碩士在職專班
    關鍵詞: 資安訓練
    資通安全管理法
    德菲法
    日期: 2021
    上傳時間: 2021-02-26 09:22:07 (UTC+8)
    摘要: 資通安全管理法於107年5月三讀通過,自108年1月1日正式施行。本法將公務機關及特定非公務機關之資通安全責任等級,各自賦予不同的應辦事項要求。自施行後已經過2年,欲了解執行資通安全管理法要求所需能力,目前資安人才培訓練課程是否足夠。
    本研究首先探討我國資安相關法規對政府機關的規定與要求,蒐集國內外有關資安人才培育之文獻,分析各制度與標準對資安人才培育之作法,透過專家意見收斂並歸納應辦事項與資安人才培育對應優先順序。研究結果發現,管理面委外廠商資安管理與稽核與評估委外廠商資安專業能力,技術面執行資通系統開發之安全需求設計、測試(含源碼安全管理)等三項是目前訓練課程較為缺乏的,可做為資安人才培訓規劃上的參考依據。
    Cyber Security Management Law was passed the third reading in May 2018, and it was officially implemented on January 1, 2019. This measure assigns different levels of responsibility for information security to public agencies and specific non-public agencies.Two years have passed since its implementation. If you want to understand the capabilities required to implement the requirements of the Information Security Law,whether the current information security personnel training courses are adequate.
    First, discuss the regulations and requirements of Taiwan's information security laws and regulations on government agencies, collect domestic and foreign literature on information security personnel training, analyze the practices of various systems and standards for information security personnel training, and converge through expert opinions and summarize what should be done Matters correspond to the priority order of information security personnel training. The results of the study found that the management of outsourced vendors’ information security management, audit and evaluation of the outsourcing vendors’ information security expertise, and technical implementation of information communication system development, security requirements design and testing (including source code security management) are currently relatively trained The lack of courses can be used as a reference for cyber security personnel training planning.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML420檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋