none

碩士 === 國立中央大學 === 管理學院高階主管企管碩士班 === 100 === The progress and popularization of information technology, business use of information systems and rely on increasingly high level of information, business information systems used to replace repetitive manual tasks, become competitive weapon subsequently....

Full description

Bibliographic Details
Main Authors: Hong-ming Huang, 黃泓銘
Other Authors: none
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/36276054170243144771
id ndltd-TW-100NCU05627002
record_format oai_dc
spelling ndltd-TW-100NCU056270022015-10-13T21:22:20Z http://ndltd.ncl.edu.tw/handle/36276054170243144771 none 企業資訊安全體系(ISO27001)導入之研究─以個案公司為例 Hong-ming Huang 黃泓銘 碩士 國立中央大學 管理學院高階主管企管碩士班 100 The progress and popularization of information technology, business use of information systems and rely on increasingly high level of information, business information systems used to replace repetitive manual tasks, become competitive weapon subsequently. Enterprises to use the convenience of information technology, but also prevent information leakage caused by the competitive threat, so the information security 』『 organization is an important issue can not be ignored. How companies make the best use of resources, effective implementation of information security policy and management, is the challenge of the project organization subsequently. Security specification was first proposed by the British National Standards Institute (British Standards Institute, BSI) in 1995 proposed Information Security Management System BS7799 (ISMS ︰ Information Security Management System) is to BS7799 Part I, in June 2005 to become ISO / IEC 17799 ︰ 2005 International Standard, BS7799 Part II in October 2005 by the International Organization for Standardization (ISO) formally adopted as ISO / IEC 27001 Information Security Management System ︰ 2005 standard, is now the most recognized by the international community and adopt the information security management standards. In this study, case study, the use of in-depth interviews and questionnaire survey, case discussion, Information Security Management System (ISMS ︰ Information Security Management System) and get information security certification, induction into the enterprise information security system of risk assessment of information assets Elements of the resistance faced by users of the benefits and differences between before and after import. Can be used as a reference for other enterprises to import and shorten the time of import process. And achieve continuous improvement requirements through the PDCA (Plan, Do, Check, Action) management cycle. none 林子銘 2012 學位論文 ; thesis 101 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 管理學院高階主管企管碩士班 === 100 === The progress and popularization of information technology, business use of information systems and rely on increasingly high level of information, business information systems used to replace repetitive manual tasks, become competitive weapon subsequently. Enterprises to use the convenience of information technology, but also prevent information leakage caused by the competitive threat, so the information security 』『 organization is an important issue can not be ignored. How companies make the best use of resources, effective implementation of information security policy and management, is the challenge of the project organization subsequently. Security specification was first proposed by the British National Standards Institute (British Standards Institute, BSI) in 1995 proposed Information Security Management System BS7799 (ISMS ︰ Information Security Management System) is to BS7799 Part I, in June 2005 to become ISO / IEC 17799 ︰ 2005 International Standard, BS7799 Part II in October 2005 by the International Organization for Standardization (ISO) formally adopted as ISO / IEC 27001 Information Security Management System ︰ 2005 standard, is now the most recognized by the international community and adopt the information security management standards. In this study, case study, the use of in-depth interviews and questionnaire survey, case discussion, Information Security Management System (ISMS ︰ Information Security Management System) and get information security certification, induction into the enterprise information security system of risk assessment of information assets Elements of the resistance faced by users of the benefits and differences between before and after import. Can be used as a reference for other enterprises to import and shorten the time of import process. And achieve continuous improvement requirements through the PDCA (Plan, Do, Check, Action) management cycle.
author2 none
author_facet none
Hong-ming Huang
黃泓銘
author Hong-ming Huang
黃泓銘
spellingShingle Hong-ming Huang
黃泓銘
none
author_sort Hong-ming Huang
title none
title_short none
title_full none
title_fullStr none
title_full_unstemmed none
title_sort none
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/36276054170243144771
work_keys_str_mv AT hongminghuang none
AT huánghóngmíng none
AT hongminghuang qǐyèzīxùnānquántǐxìiso27001dǎorùzhīyánjiūyǐgèàngōngsīwèilì
AT huánghóngmíng qǐyèzīxùnānquántǐxìiso27001dǎorùzhīyánjiūyǐgèàngōngsīwèilì
_version_ 1718061336734203904