透過您的圖書館登入
IP:3.21.93.44
  • 期刊
  • OpenAccess

資安稽核管理系統建置與資訊業務整合之研究-以空軍某單位為例

Integration of a Security Auditing System into Information Business Operations - a Case Study for a Unit of the Republic of China Air Force

摘要


近年來,隨著資訊科技的蓬勃發展,以往採取人工作業之方式,已逐漸被資訊化作業取代,目前空軍的內部資訊環境現況,多以桌上型電腦等端點設備為主,惟廣泛的資訊應用環境,也帶來不同形式的網路攻擊及人員非法存取威脅,如電腦病毒、系統弱點漏洞、人員移動式儲存媒體之惡意存取等。個人電腦為推動業務資訊化之環境中,數量最多的設備,惟如何加強端點防護監控作為,避免資訊威脅而遭致資料失竊,為空軍推展資訊安全業務中不可忽視之課題。然而,空軍端點防護稽核方式係採人工逐台逐步檢查,徒增人力及時間成本,無法有效遂行端點稽核業務。本研究係針對目前空軍端點資安防護作為現況,藉導入資訊技術之方式進行業務整合,提供資訊專業人員精準分析參據,使其能迅速完成漏洞修補及問題查處作業。透過模擬實驗所進行之差異分析,顯示導入系統可縮減約90%之工時,有效提升整體作業效益,優化整體資安管理效能,落實遂行國軍資安政策之防護作為。

並列摘要


In recent years, with the rapid development of information technology (IT), manual work has been gradually replaced by the IT-assisted operations. The current internal IT environment of the Republic of China Air Force mainly consists of desktop personal computers and other endpoint devices. An extensively utilized IT environment is inevitably exposed to different forms of cyber-attacks and threats of unauthorized access, for instance, computer viruses, system vulnerabilities, and malicious access through mobile storage devices. The majority of devices driving business informatization are personal computers. Strengthening the endpoint protection and monitoring as a means of mitigating information security threats is an unneglectable subject matter in promoting information security of the Air Force. However, the approach currently adopted by the Air Force is manual, step-by-step inspection, which is time-consuming and laborious. For auditing the endpoint operations, it is not effective. This study is based on the current situation of the endpoint information security of the Air Force. Through introducing and integrating the IT system into business operations, this study provides an accurate analysis for IT professionals to quickly complete bug fixes and problem investigations. The simulation results show that a reduction of approximately 90% in work hours can be obtained after such an integration. It is thus verified that the overall information security management performance can be enhanced, and the information security policy for the national armed forces can be put into effect.

延伸閱讀