透過您的圖書館登入
IP:3.140.185.147
  • 期刊

資訊管理系統之網路安全弱點評估與入侵偵測防禦技術探討

Vulnerability Assessment, Intrusion Detection and Prevention for Management Information System

並列摘要


Networks have become very important for conducting business in government, industry, and academic organizations. Networked systems allow access to needed information rapidly, improve communications while reducing costs, enable collaboration with partners, provide better customer services, and conduct electronic commerce. Organizations have moved to client-server architectures where servers and workstations communicate through networks. While computer networks revolutionize the way business is done, the risks they introduce can be fatal. Attacks on networks can lead to lost money, time, products, reputation, sensitive information, and even lives. Information protection decisions are often incomplete or ineffective because they are based on the organization's prior experience with vulnerabilities and current threats. While managing information security risks and vulnerabilities help ensure that information protection strategies are appropriate, most risk assessments are incomplete, or are conducted by external consultants who have little knowledge of the organization's unique requirements.

參考文獻


蘇俊義(2004)。入侵偵測與入侵預防的相關性。網路通訊。101,1968/7/1。
蔡孟先(2004)。當網路技術不斷的演進,IDS也慢慢浮現出些許的技術問題。網路通訊。156,77-81。
IT HOME Weekly(2006)。病毒佯裝安全更新,開啟附件即會上網自動更新產生新變種。IT HOME。267,72。
陳達佑(2004)。入侵偵測與入侵防禦系統像間諜。資安人。7,67-70。
曾文勳(2004)。該選入侵偵測還是入侵預防。網路通訊。26,56-59。

延伸閱讀