The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example

碩士 === 元智大學 === 資訊管理學系 === 98 ===   The security issue, and protecting method and theory of the technology have become a controversial topic since individuals rely on the convenience of using it. However, the event of hacking or digital data stolen is still happened around the world. As a result, we...

Full description

Bibliographic Details
Main Authors: Chung-Yi Huang, 黃崇益
Other Authors: 龐金宗
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/27591799195056051056
Description
Summary:碩士 === 元智大學 === 資訊管理學系 === 98 ===   The security issue, and protecting method and theory of the technology have become a controversial topic since individuals rely on the convenience of using it. However, the event of hacking or digital data stolen is still happened around the world. As a result, we can notice that some of issues have been ignored.   This dissertation will only focus on computer end-users who are computing operators or do not own any professional skill of the information technology, to design a system of information security audit and the follow modification as a standard. Thus, computer end-users or administrator can setup and execute the information security auditing system instantly and precisely. This system also provides an event file of recording all auditing actions for the future management and audit; therefore, it can improve the security level of the information technology for each enterprise and even individual.   The system of our dissertation will be called "Information security installation checking and modifying system". It has been used in a practical company environment, with vulnerability scanner system risk analysis, intrusion detection system, and records of the central Anti-virus system for comparison. From the comparing result, verify the security level of the information technology for each enterprise and individual should be improved. After three month implementation, the result shows that system risk values, virus attacking records and hacking events are reduced dramatically. As a result, our experimentation can actually assist companies or humans to improve the level of the information technology security.