透過您的圖書館登入
IP:52.15.70.191
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


當企業為了追求效率以及迅速因應環境的瞬息萬變,紛紛採用資訊科技協助執行各項業務時,就表示企業的資訊化程度越來越高,發生資安事故對企業造成的衝擊也隨之增加。為了強化資訊安全,降低風險發生的機率及衝擊,資訊安全管理系統 (Information Security Management System, ISMS) 已經成為全球各國政府與企業公認的資訊安全管理最佳參照與標準。 本研究以國內現今最熱門的雲端產業導入ISMS為例,從個案研究的角度,從ISMS的導入動機、差異分析作業、資產盤點與風險評鑑、建立資訊安全管理體系、教育訓練、內部稽核、管理審查、矯正預防措施,以及第三方驗證,最終在2011年初取得國際標準ISO/IEC 27001:2005認證,深入探討ISMS導入遭遇的困難與解決方式、導入的效益以及關鍵成功因素。 研究結果發現ISMS導入範圍是否包含企業的關鍵核心業務,決定了企業落實資訊安全的決心。藉由尋求專業資安顧問的協助,導入已獲得業界認可的資訊安全管理方法論,進行全方位的風險分析,從制度面將各個控制環節加以串聯。首先在資訊安全政策明確宣示組織保護的範圍,並建立資訊安全組織進行跨部門的溝通協調,讓員工清楚感受到高階主管的願景與決心。搭配適當的資安教育訓練,提升員工資訊安全意識,將資安深化於作業之中,最後使企業培養出自我持續改善的能力,進而達到企業永續經營的目的。

並列摘要


Organizations use Information Technology (IT) to enhance their effective and efficient responses for facing this rapid growing world. The more IT they adopt, the more information security incidents can happen and the more impact they can be. In order to improve information security and decrease the probability of risk occurrence, more and more government agencies and enterprises implement the best practice, Information Security Management System (ISMS), in the information security field. This thesis is based on the case study, which is the process of an enterprise in the cloud industry to implementing ISMS. It includes the motivation of implementation, gap analysis, asset collection, risk assessment, ISMS establishment, awareness training, internal auditing, management review, corrective and preventive actions, and third party certification so that the enterprise obtained the international ISO/IEC 27001:2005 certificate in early 2011. The contribution of this thesis is to find the difficulties and solutions, benefits, and critical success factors while implementing ISMS. The research result indicates that the organization’s determination of putting information security into practice is based on whether its core business function is included in the ISMS scope or not. By the assistance of professional information security consultants to implement ISMS via a recognized methodology in the industry, the organization can conduct comprehensive risk analysis and adopt information security controls from different perspectives. After declaring the implementation scope in information security policy and create a dedicated information security organization to have cross-teams’ communication and coordination, employees in the organization can fully understand the support and commitment of their senior management. Along with appropriate information security trainings to enhance employees’ information security awareness, the organization can fulfill the objective of continuous improvement and the purpose of long-run business operations.

參考文獻


[8] 林勤經、樊國楨、方仁威、黃景彰 (2002) ,「資訊安全管理系統建置工作之研究」,資訊管理研究,第四卷,第二期,pp. 43-65。
[10] 徐弘昌 (2009) ,「以ISO 27001為基礎評估電信業資訊安全管理 - 以第一類電信業者為例」,國立交通大學管理學院碩士在職專班管理科學組碩士論文。
[3] ISO/IEC 27002:2007, Information technology – Security techniques – Code of practice for information security management.
[4] ISO/IEC 27005:2008, Information technology – Security techniques – Information security risk management.
[1] (ISC)2 (2011). “CISSP® - Certified Information Systems Security Professional.” Available online: https://www.isc2.org/cissp/default.aspx. (Downloaded: Apr 21, 2011)

被引用紀錄


陳俊瑋(2016)。資訊安全規範影響因素評估〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201600681
賴冠華(2015)。資訊安全管理之探討 -以A公司在兩岸建構為例〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512042972
林春吟(2015)。ISO 27001:2013轉版探討-以某政府機關為例〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512051161

延伸閱讀