摘要(英) |
The progress and popularization of information technology, business use of information systems and rely on increasingly high level of information, business information systems used to replace repetitive manual tasks, become competitive weapon subsequently. Enterprises to use the convenience of information technology, but also prevent information leakage caused by the competitive threat, so the information security 』『 organization is an important issue can not be ignored. How companies make the best use of resources, effective implementation of information security policy and management, is the challenge of the project organization subsequently.
Security specification was first proposed by the British National Standards Institute (British Standards Institute, BSI) in 1995 proposed Information Security Management System BS7799 (ISMS ︰ Information Security Management System) is to BS7799 Part I, in June 2005 to become ISO / IEC 17799 ︰ 2005 International Standard, BS7799 Part II in October 2005 by the International Organization for Standardization (ISO) formally adopted as ISO / IEC 27001 Information Security Management System ︰ 2005 standard, is now the most recognized by the international community and adopt the information security management standards.
In this study, case study, the use of in-depth interviews and questionnaire survey, case discussion, Information Security Management System (ISMS ︰ Information Security Management System) and get information security certification, induction into the enterprise information security system of risk assessment of information assets Elements of the resistance faced by users of the benefits and differences between before and after import. Can be used as a reference for other enterprises to import and shorten the time of import process. And achieve continuous improvement requirements through the PDCA (Plan, Do, Check, Action) management cycle.
|
參考文獻 |
1. 2009年第二季台灣上網人口統計http://www.find.org.tw/find/home.aspx?page=many&id=243
2. 2009年1-9月電腦網路犯罪概況http://www.npa.gov.tw/NPAGip/wSite/ct?xItem=48618&ctNode=11393&mp=1
3. 行政院主計處,「政府機關資訊安全問卷調查」,2002年
4. 資訊安全三大原則 ,http://www.tyrc.ncu.edu.tw/images/5/57/991111.pdf
5. 資安人雜誌,「如何架構資訊安全政策」,August,2004年。
6. 英國標準協會(BSI)台灣分公司,http://www.bsigroup.tw
7. 陳錦村,風險管理概要,新陸書局,2009年。
8. 莊博傑,以平衡計分卡評估醫院資訊資產企業價值之重要性,2006年。
9. 韓富州,資訊安全管理系統之規劃與建置研究-以某大型企業之風險管理為例,2008年。
10. 徐廣寅,資訊安全管理導論,金禾出版社,2003年。
11. 黃亮宇,資訊安全規劃與管理。台北:松崗電腦圖書資料,1992 年。
12. 經濟部標準檢驗局,資訊技術-安全技術--資訊安全管理系統-要求事項,CNS 27001,2005 年。
13. 瞿鴻斌,資訊安全風險評估驗證系統。世新大學管理學院資訊管理學系碩士學位論文,台北市,2005 年。
14. ISO27001認證官方網站,http://www.iso27001security.com/html/27001.html
15. Microsoft Corporation, The Security Risk Management Guide, http://www.microsoft.com/technet/security/guidance/secrisk/default.mspx, 2004.
英文部分﹕
? Anderson, James M. (2003). Why we need a new definition of information security. Computers & Security, 22(4), 308-313.
? Cavalli, E., & Mattasoglio, A., & Pinciroli, F., & Spaggiari, P. (2004). Information security concepts and practices: the case of a provincial multi-specialty hospital. International Journal of Medical Informatics, 73(3), 297-303.
? Dhillon, G., & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM, 43(7), 125-128.
? Finne, T. (2000). Information Systems Risk Management: Key Concepts and Business Processes. Computers & Security, 19(3), 234-242.
? Gritzalis, S., & Lambrinoudakis, C., & Lekkas, D., & Deftereos, S. (2005). Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine, 9(3), 413-423.
? Harris, S. (2002). All-in-One CISSP certification exam guide. Berkeley: McGraw-Hill/Osbourne.
? Heiser, J.(2002). Security Through ROSI-colored Glasses, Information Security.
? Henson, R. & Hallas, B.(2009). SMEs, Information Risk Management, and ROI. Athens Institute for Education and Research (ATINER) SMEs Conference
? Hlača, B. (2008). Influence of ISO 27001:2005 on the port of Rijeka security. Pomorstvo, god. 22, br. 2, str. 245-258.
? Park, C., S. & Jang, S., S. & Park, Y., T. (2010). A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance. International Journal of Computer Science and Network Security, 10(3).
? Schultz, E. E., & Proctor, Robert W., & Lien, Mei-Ching, & Salvendy, G. (2001). Usability and security: An appraisal of usability issues in information security methods. Computers & Security, 20:(7), 620-634.
|