English  |  正體中文  |  简体中文  |  Items with full text/Total items : 54371/62179 (87%)
Visitors : 9067432      Online Users : 96
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTHU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/86288


    Title: 資訊安全的自建與委外分析
    Authors: 陳泓哲
    Chen, Hung-Che
    Description: GH02101076522
    碩士
    經營管理碩士在職專班
    Date: 2014
    Keywords: 資訊安全;自建;委外
    Information Security;Insourcing;Outsourcing
    Abstract: 由於網際網路的日益普及化,大幅的降低了學習知識與技術的門檻,如果能夠好好的運用網路科技無遠弗屆的特性,以及善用網路上取之不盡的豐富資源,那麼網際網路的發明,對於學習新知、以及降低學習的門檻,就有很大的助益,但是「水能載舟,亦能覆舟」,如果使用不當,則後果就不堪設想,資訊安全就是其中重要的一環,因為其影響的範圍,小至個人隱私權被侵犯、公司機密資料外洩,並且傷害到整個社會的金融體系,甚至有危害國家安全之虞等,這些都是使得資訊安全的這個議題不容小歔,孫子兵法有云: 「故用兵之法,無恃其不來,恃吾有以待也﹔無恃其不攻,恃吾有所不可攻也」。就企業與組織而言,如何加強資訊安全機制,就變成現在的當務之急,如何建立堅而不摧的資訊安全堡壘,就變成當今的首要之務。
    面對日益險峻的資訊安全挑戰,企業組織需要有相對應的做法,由於資訊安全是一個專門的領域,除了需要面對專門知識領域的挑戰,還有就是時間的急迫性壓力,如何面對資訊安全領域的挑戰,並且還要兼顧時間上的無形壓力,這些都是企業或組織的嚴苛考驗。
    如何兼顧資訊安全領域的挑戰以及時間上的壓力呢?或許資訊安全委外是個可行的做法,不過,就技術而言,雖然解決了企業資訊安全的疑慮,但是卻又有機密資訊外洩的隱憂,因此,資訊安全到底是要公司自建呢?還是尋求委外的合作方式呢?如果是委外的話,究竟是要全部委外呢?還是部份委外呢?那些部份是可以委外,那些部份又是不能委外的?這些都是本研究衡量資訊安全到底是自建或是委外的重要考量因素。
    The popularity of the Internet, greatly reducing the threshold of learning knowledge and technology .There is an old adage” Water is a boon in the desert, but the drowning man curses it.” applies to convenience from Internet. If you can properly use the benefits brought by technology, of course, it is the people's welfare. If used in the wrong place, then the consequences would be disastrous. Information security is one of the important part, because the scope of its impact, personal privacy is being violated, company confidential data leakage, damage to the financial system and society as a whole, and even endangers national security, etc. But we will have unbelievable damage if use it on the wrong direction. Information security is the sample. There is an old adage of Sun Tzu on the Art of War.”If, on the other hand, in the midst of difficulties, we are always ready to seize an advantage, we may extricate ourselves from misfortune.”. Forts to strengthen information security mechanisms, it becomes a top priority for today, how to consolidate information security, it becomes imperative now.
    Information security implicates for the entire organization for sustainable development. Information security is a specialized field, the face of increasingly dangerous security challenges, organizations need to have a corresponding practice. In addition to challenging areas of expertise, there is the urgency of time. Information security both for business or organization, it is vexation important thing.
    Information security outsourcing, it might be a viable approach. Technically, you can quickly make up the gap in information security within the enterprise. But yet there is the risk of confidential information leakage considerations, therefore, Information Security Company in the end is to self-built it? Or seek cooperation outsource it? If it is outsourced, then what is to outsource all of it? Outsourcing is part of it? Those parts can be outsourced, who is not part of outsourcing? These are information security in the end of this study is to measure the self or outsource important considerations.
    URI: http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/86288
    Source: http://thesis.nthu.edu.tw/cgi-bin/gs/hugsweb.cgi?o=dnthucdr&i=sGH02101076522.id
    Appears in Collections:[經營管理碩士在職專班] 博碩士論文

    Files in This Item:

    File SizeFormat
    GH02101076522.pdf160KbAdobe PDF234View/Open


    在NTHUR中所有的資料項目都受到原著作權保護,僅提供學術研究及教育使用,敬請尊重著作權人之權益。若須利用於商業或營利,請先取得著作權人授權。
    若發現本網站收錄之內容有侵害著作權人權益之情事,請權利人通知本網站管理者(smluo@lib.nthu.edu.tw),管理者將立即採取移除該內容等補救措施。

    SFX Query

    與系統管理員聯絡

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback