The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example

碩士 === 元智大學 === 資訊管理學系 === 98 ===   The security issue, and protecting method and theory of the technology have become a controversial topic since individuals rely on the convenience of using it. However, the event of hacking or digital data stolen is still happened around the world. As a result, we...

Full description

Bibliographic Details
Main Authors: Chung-Yi Huang, 黃崇益
Other Authors: 龐金宗
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/27591799195056051056
id ndltd-TW-098YZU05396001
record_format oai_dc
spelling ndltd-TW-098YZU053960012015-10-13T18:20:42Z http://ndltd.ncl.edu.tw/handle/27591799195056051056 The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example 資訊安全標準化檢查流程之可行性探討-以微軟作業系統使用為例 Chung-Yi Huang 黃崇益 碩士 元智大學 資訊管理學系 98   The security issue, and protecting method and theory of the technology have become a controversial topic since individuals rely on the convenience of using it. However, the event of hacking or digital data stolen is still happened around the world. As a result, we can notice that some of issues have been ignored.   This dissertation will only focus on computer end-users who are computing operators or do not own any professional skill of the information technology, to design a system of information security audit and the follow modification as a standard. Thus, computer end-users or administrator can setup and execute the information security auditing system instantly and precisely. This system also provides an event file of recording all auditing actions for the future management and audit; therefore, it can improve the security level of the information technology for each enterprise and even individual.   The system of our dissertation will be called "Information security installation checking and modifying system". It has been used in a practical company environment, with vulnerability scanner system risk analysis, intrusion detection system, and records of the central Anti-virus system for comparison. From the comparing result, verify the security level of the information technology for each enterprise and individual should be improved. After three month implementation, the result shows that system risk values, virus attacking records and hacking events are reduced dramatically. As a result, our experimentation can actually assist companies or humans to improve the level of the information technology security. 龐金宗 2010 學位論文 ; thesis 75 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 元智大學 === 資訊管理學系 === 98 ===   The security issue, and protecting method and theory of the technology have become a controversial topic since individuals rely on the convenience of using it. However, the event of hacking or digital data stolen is still happened around the world. As a result, we can notice that some of issues have been ignored.   This dissertation will only focus on computer end-users who are computing operators or do not own any professional skill of the information technology, to design a system of information security audit and the follow modification as a standard. Thus, computer end-users or administrator can setup and execute the information security auditing system instantly and precisely. This system also provides an event file of recording all auditing actions for the future management and audit; therefore, it can improve the security level of the information technology for each enterprise and even individual.   The system of our dissertation will be called "Information security installation checking and modifying system". It has been used in a practical company environment, with vulnerability scanner system risk analysis, intrusion detection system, and records of the central Anti-virus system for comparison. From the comparing result, verify the security level of the information technology for each enterprise and individual should be improved. After three month implementation, the result shows that system risk values, virus attacking records and hacking events are reduced dramatically. As a result, our experimentation can actually assist companies or humans to improve the level of the information technology security.
author2 龐金宗
author_facet 龐金宗
Chung-Yi Huang
黃崇益
author Chung-Yi Huang
黃崇益
spellingShingle Chung-Yi Huang
黃崇益
The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
author_sort Chung-Yi Huang
title The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
title_short The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
title_full The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
title_fullStr The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
title_full_unstemmed The Feasibility Study of Information Security Standard Inspection Process – Using Microsoft Operating System as an Example
title_sort feasibility study of information security standard inspection process – using microsoft operating system as an example
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/27591799195056051056
work_keys_str_mv AT chungyihuang thefeasibilitystudyofinformationsecuritystandardinspectionprocessusingmicrosoftoperatingsystemasanexample
AT huángchóngyì thefeasibilitystudyofinformationsecuritystandardinspectionprocessusingmicrosoftoperatingsystemasanexample
AT chungyihuang zīxùnānquánbiāozhǔnhuàjiǎncháliúchéngzhīkěxíngxìngtàntǎoyǐwēiruǎnzuòyèxìtǒngshǐyòngwèilì
AT huángchóngyì zīxùnānquánbiāozhǔnhuàjiǎncháliúchéngzhīkěxíngxìngtàntǎoyǐwēiruǎnzuòyèxìtǒngshǐyòngwèilì
AT chungyihuang feasibilitystudyofinformationsecuritystandardinspectionprocessusingmicrosoftoperatingsystemasanexample
AT huángchóngyì feasibilitystudyofinformationsecuritystandardinspectionprocessusingmicrosoftoperatingsystemasanexample
_version_ 1718030192080846848