Case Study on Successful Implementation of EDRM System in Small-and-Medium Enterprises

碩士 === 朝陽科技大學 === 資訊工程系 === 106 === Information security is a major task in the business operations and computerization process. However, under the investigation of an endless number of internal and external security incidents at home and abroad, the issue of “theft and leakage of information” in co...

Full description

Bibliographic Details
Main Authors: TSAO, MING-TUNG, 曹銘通
Other Authors: LIAO, HSIEN-CHOU
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/5ftffh
Description
Summary:碩士 === 朝陽科技大學 === 資訊工程系 === 106 === Information security is a major task in the business operations and computerization process. However, under the investigation of an endless number of internal and external security incidents at home and abroad, the issue of “theft and leakage of information” in confidential and sensitive files has become the biggest concern for corporate security protection. Differs from the Data Loss/Leak Prevention (DLP) system in which large enterprises spend huge sums of money to build high-level software and hardware protection mechanisms. This paper presents the successful implementation of the Enterprise Digital Rights Management (EDRM) for Small-and-Medium Enterprises (SMEs). EDRM systems is used to improve the managements, such as file permissions, personnel training, network detection, and device control, under without changing user daily operation process. It can still satisfy data confidentiality, audit, file flow and tracking etc., functional appeals. Achieve the DLP stage goals and expected benefits for SMEs. In the industrial ecological chain of the low-profit era, this study achieved that the EDRM system has become an effective DLP protection strategy for SMEs. At the benefit evaluation stage, the effectiveness of the system was demonstrated by data security, data confidentiality, and corporate security capabilities. The research results show that the EDRM system can meet the DLP requirements of corporate executives and meet the three objectives of the C.I.A (Confidentiality, Integrity, Availability) of the information security specification, which enhances the competitiveness of enterprises and strengthens their corporate position.