摘要(英) |
With the popularization of the Internet and the impact of office automation, computer becomes the most dependent tools of modern enterprises. However, computer also delivers enterprise information security risks. Source of security threats has become more internal, computer virus disaster costs, but a rising trend, multinational enterprise within the anti-virus problem becomes even more important.
We will plan out a set of general virus infection source analysis automation system architecture to help the management of multinational enterprise and IT department. This system is a kind of SIEM within SOC concept to help the management of virus logs, and help to understand where internal sources of virus infection from.
Therefore, managers in IT department in multinational enterprise could know the enterprise information security information and could develop the correct appropriate information security management policies in limited resources budget, and then maximize the benefits cost considerations.
|
參考文獻 |
【中文文獻】
[方至民,2010]。方至民,國際企業管理概論。前程文化,台北,2010年。
[余明助,2000]。余明助,「跨國企業組織、策略與控制關係之研究—以臺商海外子公司為例」。國立成功大學企業管理研究所,博士論文,2000年。
[吳青松,1996]。吳青松,國際企業管理:理論與實務。智勝文化事業有限公司,台北,1996年。
[李梨君,2003]。李梨君,「跨國企業在台子公司人力資源管理制度之比較」。國立中央大學人力資源管理研究所,碩士論文,2003年。
[曾紀幸,1996]。曾紀幸,「跨國企業在臺子公司網路組織型態及其母公司管理機制選擇之關係」。國立政治大學企業管理研究所,博士論文,1996年。
[賴居正,2006] 。賴居正,九十五年度國家資通安全技術服務與防護管理計畫SOC參考指引。行政院研究發展考核委員會,2006年。
[趨勢科技,2009]。趨勢科技,趨勢科技 2008 年資安威脅摘要暨 2009 年資安趨勢預測報告。趨勢科技,2009年。
【英文文獻】
[Bartlett & Ghoshal, 2000] Bartlett, C.A. & Ghoshal, S. Transnational Management-Text, Cases and Readings in Cross-Border Management. McGraw-Hill, USA, 2000.
[Hill, C. W. L., 1998] Hill, C. W. L. Global Business Today. McGraw-Hill, USA, 1998.
[Jacqueline et al. 2006] Jacqueline Craig, Jon Good, Karl Heins, Binh Nguyen, Carl Tianen, & David Walker. Log Management for the University of California: Issues and Recommendations. University of California Information Technology Policy and Security (ITPS), USA, 2006.
[Porter, 1986] Porter, M.E. Competition in Global Industries. Boston: Harvard Business School Press, 1986.
[Rugman& Hodgetts, 1998] Rugman, A. M.and Hodgetts, R. M. International Business-A strategic Management Approach. McGraw-Hill, USA, 1998.
【網路電子資料】
[Chris Liebert, 2006] CHRIS LIEBERT. Internal Threat Protection with Net-Based Detection, Prevention and Behavioral Systems. Yankee Group, 2006. (Retrieved from http://www.yankeegroup.com/ResearchDocument.do?id=14041)
[DIGITIMES, 2011] DIGIITMES企劃. 企業資安管理政策調查專輯_5 資安政策推動最大阻礙:缺乏預算. DIGITIMES中文網, 2011. (Retrieved from http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&packageid=5219&id=0000258677_CKJ74O11653G4985FYI5D&cat=10&ct=1)
[Focus, 2012] Enterasys Secure Networks. 安全資訊與事件管理器. Focus Security Network, 2012. (Retrieved from http://www.focus-si.com/wiki/index.php/安全資訊與事件管理器_(Dragon_SIEM/ILM))
[Trend Micro OfficeScan 10 管理手冊,2009] 趨勢科技. Trend Micro OfficeScan 10 管理手冊. 趨勢科技, 2009.
[TWISC, 2006] TWISC (TAIWAN Information Security Center). 資安監控中心(Security Operation Center, SOC). 台灣科技大學資通安全研究與教學中心電子報資安專欄, 2006. (Retrieved from http://140.118.19.1/newweb/epaper/20060715/20060715資安專欄.htm)
[王榮信,2010] 王榮信. 邁向成功SOC之路. 資安人 INFO SECURITY, 2010. (Retrieved from http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=5944)
[王應達,2006] 王應達. 防毒管理大三通. TAIWAN CNET, 2006. (Retrieved from http://taiwan.cnet.com/enterprise/column/0,2000062893,20097682,00.htm)
[關貿網路,2012] TRADEVEN. SOC資訊安全作業中心架構. 關貿網路, 2012. (Retrieved from http://www.tradevan.com.tw/web/12448/72)
|