透過您的圖書館登入
IP:3.17.203.68
  • 學位論文

企業用戶資安監控需求與代管服務商機之探討

Exploration of the Demands of Enterprise Information Security Service and Potential Business Opportunities

指導教授 : 林玥岑
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本論文研究之目的,是為協助國內資安監控中心業者來深入了解國內企業客戶(含財團法人客戶)的資安監控服務需求,並藉由分析需求,發掘何為國內企業客戶市場較有經濟效益的監控服務商機,供國內資安監控中心業者用於掌握企業客戶商機、規劃企業客戶監控服務時之參考。 本研究採半結構式之深度訪談法,共深度訪談六位受訪者,其中三位受訪者任職於本研究研究案例之資安監控中心,代表賣方意見,以10題賣方訪談問題訪問之,另三位受訪者則分別任職於有使用本研究案例資安監控服務的知名企業或財團法人機構,代表買方意見,以12題買方訪談問題訪問之。 最後,本研究利用KANO模型及本研究的四個問題對訪談稿進行分類分析,得到研究結論如下: 一、SOC監控服務須提供客戶穩固可信賴之「資安安全感」。 二、在相同收費下,可提供企業客戶較高「顧客價值」的SOC勝出。 三、SOC監控服務須「減輕資安事務工作量」,企業才會持續使用。 四、SOC中心監控主力設備應為「入侵防禦設備」、「網頁應用程式防火牆」、 「網路防火牆」等三項,監控服務資源的投入亦應以此為優先。 五、資安案件通報的「準確度」及「時效性」為SOC監控服務成敗關鍵。 六、同時具備「資安監控服務」、「資安專業服務」及「資安預警服務」三種能 力的SOC中心,方能完整滿足國內企業客戶需求。 七、SOC監控服務須能協助企業「降低法律訴訟的風險」。 關鍵字:資安監控中心、資安監控需求、代管服務商機、SOC。

並列摘要


This study aims to help the Security Operation Center (SOC) suppliers in Taiwan obtain a thorough understanding of enterprises’ demand of information security service; furthermore, this study would like to explore the potential business opportunities in the market of Taiwan’s enterprises so that it can serve as a reference for the SOC suppliers in the future. The research is conducted by semi-structured in-depth interviews. There are six interviewees, and three of them are employed by the SOCs in the range of this study. The three interviewees answered ten questions in the service provider’s point of view. The other three interviewees are employed in large enterprise and corporations that use the SOC services in the range of this study as well. They answered twelve questions from the client’s point of view. The interview results are analyzed by the Kano model and from the perspective of four main questions of this study. The conclusions are as follows: 1. Clients prefer the SOC that provides a sense of stability, reliability and security of their information security. 2. Under the same charge, the SOC that offers a higher customer value stands out. 3. An enterprise will continue to use a SOC service when it can reduce the workload of information security affairs in an enterprise. 4. The three most important equipment at the SOC are intrusion prevention system, web application firewall, and network firewall; they are also the priorities that a SOC should invest in. 5. The accuracy and promptness of reporting information security events is the key to success of the SOC. 6. To fulfill the need of Taiwan’s enterprises altogether, an SOC needs to provide information security service, professional service and early warning service simultaneously. 7. An ideal SOC service is able to help an enterprise to reduce the chances of legal action. Key word: Security Operation Center (SOC), information security demand, potential business opportunities

參考文獻


Drucker, P.F. (1954). The Practice of Management, pp.78-79.
Woodruff, R. B. (1997). “Customer Value: The Next Source for Competitive Advantage”,Journal of the Academy of Maketing Science. Vol.25, Iss.2, pp.142-143.
Zeithaml, V. A. (1988). “Consumer Perceptions of Price, Quality and Value:A Means-End Model and Synthesis of Evidence,” Journal of Marketing, 52 (July), pp 2-22.
Judson, K. (1994). Computer Crime: Phreaks, Spies, and Salami Slicers, NJ: Enslow Publishers, pp.36-37.
Minichiello V., Aroni R., Timewell E. & Alexander L. (1995). “ In-depth Interviewing ”, Second Edition, pp.62.

延伸閱讀