A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military
碩士 === 國防大學 === 資訊管理學系 === 105 === With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Ar...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/9x7p2s |
id |
ndltd-TW-105NDU00654001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NDU006540012019-05-15T23:10:11Z http://ndltd.ncl.edu.tw/handle/9x7p2s A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military 無線區域網路資訊安全管理之研究-以國軍某學術單位為例 CHENG, YU-TING 鄭宇廷 碩士 國防大學 資訊管理學系 105 With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Area Network (Wireless LAN, WLAN). These products are the most mature in terms of technology, openness, standardization and transmission speed, and are widely used in homes, offices and enterprises. WLAN also has become another way to connect the Internet. However, there are growing concerns about the security of the Internet because of the proliferation of mobile Internet usage. According to the survey which published by TWNIC in 2015, nearly 65% of the respondents said they worried about the security of mobile Internet access. At the same time, the issues of protecting mobile Internet privacy are also increasing, which according to the survey indicates that privacy issues of Internet increased importance for users from 45% in May 2015 to 75% at the end of 2015. Ministry of National Defense is one part of the whole government‘s information security defense. In accordance with the Executive Yuan guidance, Ministry of National Defense is responsible for the defense of the Military network system, and focuses on the protection of the military network , planning and promotion of information security , and cyber incident response as its primary goals. Ministry of National Defense uses the techniques of “isolated Military Network and private networks” as the foundation for its Military Information Security Policy, and to build up the defense and audit mechanisms for Military Information Security. In response to the rapid development of information technology, and the corresponding increase of new information security threats, Ministry of National Defense conducts the development of appropriate information security defense policies to safeguard the confidentiality, integrity and availability of the military network without any physical and intrusive damage. This study is based on the military information security policy guidelines and references the ISO 27001 international standards, the concept and norms of Information Security Management System. The research will discuss the procedures and information security management practices of demand units, such as medical institutions and research institutes, developing wireless regional networks using the necessary security requirements, precautions and self-audit operations forms during planning, and different stages of operation. The final goal is to enhance the level of the military information security and reduce the probability of information security events. FU,CHEN-HUA LIU,FAN-PYN 傅振華 劉芳萍 2017 學位論文 ; thesis 116 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學 === 資訊管理學系 === 105 === With the development of the Internet and the popularity of various mobile devices, people are eager to immediately connect to the Internet. Therefore, all kinds of wireless technology have been developed, including the products of 802.11 series of Wireless Local Area Network (Wireless LAN, WLAN). These products are the most mature in terms of technology, openness, standardization and transmission speed, and are widely used in homes, offices and enterprises. WLAN also has become another way to connect the Internet.
However, there are growing concerns about the security of the Internet because of the proliferation of mobile Internet usage. According to the survey which published by TWNIC in 2015, nearly 65% of the respondents said they worried about the security of mobile Internet access. At the same time, the issues of protecting mobile Internet privacy are also increasing, which according to the survey indicates that privacy issues of Internet increased importance for users from 45% in May 2015 to 75% at the end of 2015.
Ministry of National Defense is one part of the whole government‘s information security defense. In accordance with the Executive Yuan guidance, Ministry of National Defense is responsible for the defense of the Military network system, and focuses on the protection of the military network , planning and promotion of information security , and cyber incident response as its primary goals. Ministry of National Defense uses the techniques of “isolated Military Network and private networks” as the foundation for its Military Information Security Policy, and to build up the defense and audit mechanisms for Military Information Security. In response to the rapid development of information technology, and the corresponding increase of new information security threats, Ministry of National Defense conducts the development of appropriate information security defense policies to safeguard the confidentiality, integrity and availability of the military network without any physical and intrusive damage.
This study is based on the military information security policy guidelines and references the ISO 27001 international standards, the concept and norms of Information Security Management System. The research will discuss the procedures and information security management practices of demand units, such as medical institutions and research institutes, developing wireless regional networks using the necessary security requirements, precautions and self-audit operations forms during planning, and different stages of operation. The final goal is to enhance the level of the military information security and reduce the probability of information security events.
|
author2 |
FU,CHEN-HUA |
author_facet |
FU,CHEN-HUA CHENG, YU-TING 鄭宇廷 |
author |
CHENG, YU-TING 鄭宇廷 |
spellingShingle |
CHENG, YU-TING 鄭宇廷 A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
author_sort |
CHENG, YU-TING |
title |
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
title_short |
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
title_full |
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
title_fullStr |
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
title_full_unstemmed |
A Study on Information Security Management for Wireless Local Area Networks - a Case Study on an Academic Institution in R.O.C. Military |
title_sort |
study on information security management for wireless local area networks - a case study on an academic institution in r.o.c. military |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/9x7p2s |
work_keys_str_mv |
AT chengyuting astudyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary AT zhèngyǔtíng astudyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary AT chengyuting wúxiànqūyùwǎnglùzīxùnānquánguǎnlǐzhīyánjiūyǐguójūnmǒuxuéshùdānwèiwèilì AT zhèngyǔtíng wúxiànqūyùwǎnglùzīxùnānquánguǎnlǐzhīyánjiūyǐguójūnmǒuxuéshùdānwèiwèilì AT chengyuting studyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary AT zhèngyǔtíng studyoninformationsecuritymanagementforwirelesslocalareanetworksacasestudyonanacademicinstitutioninrocmilitary |
_version_ |
1719142758954827776 |