A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military

碩士 === 國防大學 === 資訊管理學系 === 105 === With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Ar...

Full description

Bibliographic Details
Main Authors: CHENG, YU-TING, 鄭宇廷
Other Authors: FU,CHEN-HUA
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/9x7p2s
id ndltd-TW-105NDU00654001
record_format oai_dc
spelling ndltd-TW-105NDU006540012019-05-15T23:10:11Z http://ndltd.ncl.edu.tw/handle/9x7p2s A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military 無線區域網路資訊安全管理之研究-以國軍某學術單位為例 CHENG, YU-TING 鄭宇廷 碩士 國防大學 資訊管理學系 105 With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Area Network (Wireless LAN, WLAN). These products are the most mature in terms of technology, openness, standardization and transmission speed, and are widely used in homes, offices and enterprises. WLAN also has become another way to connect the Internet. However, there are growing concerns about the security of the Internet because of the proliferation of mobile Internet usage. According to the survey which published by TWNIC in 2015, nearly 65% of the respondents said they worried about the security of mobile Internet access. At the same time, the issues of protecting mobile Internet privacy are also increasing, which according to the survey indicates that privacy issues of Internet increased importance for users from 45% in May 2015 to 75% at the end of 2015. Ministry of National Defense is one part of the whole government‘s information security defense. In accordance with the Executive Yuan guidance, Ministry of National Defense is responsible for the defense of the Military network system, and focuses on the protection of the military network , planning and promotion of information security , and cyber incident response as its primary goals. Ministry of National Defense uses the techniques of “isolated Military Network and private networks” as the foundation for its Military Information Security Policy, and to build up the defense and audit mechanisms for Military Information Security. In response to the rapid development of information technology, and the corresponding increase of new information security threats, Ministry of National Defense conducts the development of appropriate information security defense policies to safeguard the confidentiality, integrity and availability of the military network without any physical and intrusive damage. This study is based on the military information security policy guidelines and references the ISO 27001 international standards, the concept and norms of Information Security Management System. The research will discuss the procedures and information security management practices of demand units, such as medical institutions and research institutes, developing wireless regional networks using the necessary security requirements, precautions and self-audit operations forms during planning, and different stages of operation. The final goal is to enhance the level of the military information security and reduce the probability of information security events. FU,CHEN-HUA LIU,FAN-PYN 傅振華 劉芳萍 2017 學位論文 ; thesis 116 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學 === 資訊管理學系 === 105 === With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Area Network (Wireless LAN, WLAN). These products are the most mature in terms of technology, openness, standardization and transmission speed, and are widely used in homes, offices and enterprises. WLAN also has become another way to connect the Internet. However, there are growing concerns about the security of the Internet because of the proliferation of mobile Internet usage. According to the survey which published by TWNIC in 2015, nearly 65% of the respondents said they worried about the security of mobile Internet access. At the same time, the issues of protecting mobile Internet privacy are also increasing, which according to the survey indicates that privacy issues of Internet increased importance for users from 45% in May 2015 to 75% at the end of 2015. Ministry of National Defense is one part of the whole government‘s information security defense. In accordance with the Executive Yuan guidance, Ministry of National Defense is responsible for the defense of the Military network system, and focuses on the protection of the military network , planning and promotion of information security , and cyber incident response as its primary goals. Ministry of National Defense uses the techniques of “isolated Military Network and private networks” as the foundation for its Military Information Security Policy, and to build up the defense and audit mechanisms for Military Information Security. In response to the rapid development of information technology, and the corresponding increase of new information security threats, Ministry of National Defense conducts the development of appropriate information security defense policies to safeguard the confidentiality, integrity and availability of the military network without any physical and intrusive damage. This study is based on the military information security policy guidelines and references the ISO 27001 international standards, the concept and norms of Information Security Management System. The research will discuss the procedures and information security management practices of demand units, such as medical institutions and research institutes, developing wireless regional networks using the necessary security requirements, precautions and self-audit operations forms during planning, and different stages of operation. The final goal is to enhance the level of the military information security and reduce the probability of information security events.
author2 FU,CHEN-HUA
author_facet FU,CHEN-HUA
CHENG, YU-TING
鄭宇廷
author CHENG, YU-TING
鄭宇廷
spellingShingle CHENG, YU-TING
鄭宇廷
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
author_sort CHENG, YU-TING
title A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
title_short A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
title_full A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
title_fullStr A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
title_full_unstemmed A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
title_sort study on information security management for wireless local area networks - a case study on an academic institution in r.o.c. military
publishDate 2017
url http://ndltd.ncl.edu.tw/handle/9x7p2s
work_keys_str_mv AT chengyuting astudyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary
AT zhèngyǔtíng astudyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary
AT chengyuting wúxiànqūyùwǎnglùzīxùnānquánguǎnlǐzhīyánjiūyǐguójūnmǒuxuéshùdānwèiwèilì
AT zhèngyǔtíng wúxiànqūyùwǎnglùzīxùnānquánguǎnlǐzhīyánjiūyǐguójūnmǒuxuéshùdānwèiwèilì
AT chengyuting studyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary
AT zhèngyǔtíng studyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary
_version_ 1719142758954827776