透過您的圖書館登入
IP:3.14.132.214
  • 學位論文

全球化時代台灣資訊網路安全之實證研究(2000 – 2014)

The Research of Taiwan’s Information Network Security in the era of Globalization (2000- 2014)

指導教授 : 蔡育岱
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本篇研究主要在於台灣近代(2001~2014年)以來有關台灣資訊網路安全與行政院於2001年通過「建立我國通訊基礎建設安全機制計劃」,在2013年政府相關部門開始從內部稽核,所推出ISMS (Information Security Management System), 有系統地分析和管理資訊安全風險的方法,引進政府各單位相關部門,透過資訊安全制度的實施,促使各單位重視資訊及網路安全,進而投入大量人力與資源,加上民間機構的通力合作,促進我國整體資訊安全能力提升,本文方向探討及著重在政府機關(構)資訊網路是否落實資訊網路安全之相關實務驗證。 作者在編撰本篇論文除了個人工作因素、興趣、對網路實務的見解,以及因工作職務關係,利用實作驗證來談論台灣相關網路現象及問題,因研究時間有限,所以集中在個案探討,單純探討資訊安全概念、重要性、以及實務界的做法,其中可能延伸至國家層級的問題,而將相關網路戰爭(資訊戰或網路戰),網路駭客攻擊(攻擊者角度),或網路犯罪,定義其範圍及方向,讓讀者更清楚了解,是偏向網路攻擊或是跨國型網路犯罪,還是構成網路戰爭、資訊戰爭,但能確認的是透過網路平台架構,也能發動資訊或網路戰爭,如中國與美國網路攻擊事件,國與國之間的資訊實力暗中較勁,也是作為個人、企業、關鍵基礎建設及政府機關作為參考,永續經營及改善之處。希望本文實例研究之努力,對台灣資訊網路安全發展盡一分棉薄之心力。

關鍵字

APT攻擊 ISMS 駭客攻擊 社交工程

並列摘要


The research is primarily concerned with the Executive Yuan of Taiwan’s IT network security adopted in 2001 “to establish communications infrastructure of security mechanisms plan” since 2001 to 2014. That’s related to the relevant government authorities to implement verification (institutions) whether the implementation of information network security related work , the relevant government departments in 2013 to start from the internal audit, the launch ISMS (Information Security Management System), a systematic analysis and management of information security risk approach, the introduction of government information via a secure system implementation, prompting the units of information and network security importance, and thus a lot of manpower and resources, coupled with the co-operation of non-governmental organizations, to promote the country to enhance the overall information security capabilities. In addition to the preparation of this paper, the authors personal job factors, interests, practical insights for the network, as well as their duties because of work, the use of implements authentication to Internet phenomenon and talk about issues related to Taiwan, because of research time is limited, so concentrated in a single investigate cases, which may be extended to the national level issue, and the associated network war (information warfare or cyber warfare), Internet hackers (attackers angle), or cybercrime, define its scope and direction, let the reader understand more clearly the network is biased attack or transnational cybercrime, cyber war, or constitute information war, but was able to confirm through the Internet platform architecture, but also to mobilize information or cyber war , in research instances, for example, such as China and the U.S. network attacks, information between countries vied strength, but also as individuals, businesses, critical infrastructure and government agencies as a reference, sustainable management and improvement. I hope this article examples of research efforts on the development of Taiwan’s IT network security, to make my effort to contribute to my love home town, Taiwan.

參考文獻


林宗達,以劣勝優:中共信息戰之不對稱戰(台北:晶典文化出版,2005年)。
陳立函、葉怡群、陳世仁、許富皓,「近年網路攻擊與中國駭客活動」,前瞻科技與管理特刊(2010年11月),頁137-147。
Clarke, Link, and Richard Alan, Cyber war : The Next Threat to National Security and What to Do about It ( New York : Ecco, 2012).
Colarik, Andrew Michael, Cyber Terrorism: Political and Economic Implications ( Hershey: Idea Group Pub, 2006).
Murray, Link, Andrew D, The regulation of Cyberspace : Control in the Online Environment (New York: Routledge-Cavendish, 2007).

延伸閱讀