Critical Success Factors of Enforcing Enterprise Cybersecurity-A Case Study of Telecom Industry

碩士 === 國立臺灣科技大學 === 資訊管理系 === 105 === A war of information security without guns has begun to threaten the industry, official and academy. It is said that “Information security is national security.” The net crimes are organized and planned. Criminals behind these crimes start attacks, steal informa...

Full description

Bibliographic Details
Main Authors: Feng-Xu, 郭豐緖
Other Authors: Zong-Cheng Wu
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/xrqhhj
Description
Summary:碩士 === 國立臺灣科技大學 === 資訊管理系 === 105 === A war of information security without guns has begun to threaten the industry, official and academy. It is said that “Information security is national security.” The net crimes are organized and planned. Criminals behind these crimes start attacks, steal information from the system, and damage the system by using computer technologies and psychological tricks. This study refers to The Art of War by Sun Tzu and information security theory, and transforms the knowledge in the book and theory into a research structure with VLCA critical factors. We also conducted case interviews. In this study, we want to understand how telecommunication companies conduct network defense when facing new types of hacking to lower all types of information security risks, provide a safe operating environment, protect customer information and keep enterprises competitive. According to data analysis, we found out that the companies we studied create policies from the vision to implement information security and reinforce the defense for the entire company to achieve flawless information security. Based on the analysis above, we realized that in this study we can use The Art of War by Sun Tzu to make a plan of network security which can be used as a reference to modern application of information security.