透過您的圖書館登入
IP:52.14.150.55
  • 期刊

網路科技發展與資訊安全管理研究探討

Modern Defense Information Technology and Information Security Theories

摘要


由於資訊科技、網路技術發展的一日千里,二十一世紀已是資訊爭奪的世紀,「網路戰爭」成為一種新戰爭形態,更成為當代戰爭中相當重要的一環,「制網路權」可與「制空權」相提並論。資訊戰時代來臨,必須憑藉全民資訊安全共同因應,面對號稱「大國崛起」的中共處處與美國爭雄、競逐世界影響力,在「網路空間」的攻防更是時有所聞。本論文針對國防資訊科技發展趨勢與資訊安全理論技術加以深入探討,現代國防科技建軍應重視網狀化作戰理論與資訊安全技術,結合未來作戰需求與整合軍民科技能量,分階段逐步發展穩固安全資訊基礎建設與自動化聯合作戰指管系統,以鞏固與確保國防安全與資訊優勢。

並列摘要


21st century is the era of computer network technology, information can be promptly delivered and exchanged via network, hence, the global society is therefore be generated. Along with the popularity of internet, information security issues become more and more important. Information superiority is the potential force of national, global, and corporate power. The era of information warfare, information security must be shared with all the people in response to the face known as ”the rise of great powers,” the Chinese Communist Party and the U.S. hegemony everywhere compete for influence in the world. This paper has discussed the trend of national defense information technologies as well as network security theories. We should pay attention to network centric warfare theory and information security technology, combined with the integration of future operational needs of military and civilian technology energy, phased development of strong security information Infrastructure and Automation joint operations command and control systems, in order to consolidate and ensure national security and information advantage. Most importantly, to robust our national defense, we should incorporate future combat requirements, and also integrate military-civilian technologies to steadily develop the secure information infrastructure and the intelligent joint warfare operation-control systems for superior information warfare.

參考文獻


資安人編輯部 (2010). Information Security 資安人科技網, 資料庫熱門新聞, RSA 2010(三): 政府該有的網路防災觀念, 2010 年3 月8 日, 取自http://www.isecutech.com.tw
奇摩知識 (2005). 第一次波灣的美軍所使用的高科技武器, 美軍對武器系統發展的指導, 取http://tw.knowledge.yahoo.com/question
梁華傑 (2013). 青年日報專論:共軍駭客入侵劇增美掌控「制網路權」應戰, 2013年3 月27 日, 取自http://news.gpwb.gov.tw/news.aspx
資安人科技網 (2013). 國安局:攻擊38%來自本地嵌 入式系統成新目標, Information Security, 2013 年01 月29 日, 取自 http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=7412
路透社 (2013). 駭客入侵國防網路、美首點名大陸, 2013 年5 月7 日, 取自 http://www.reuters.com/

被引用紀錄


黃綾杰(2016)。從美國「戰略再保證」論美「中」網路戰略競合〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2016.00345
蘇明絹(2015)。智慧型行動裝置跨平台整合創新研究〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2015.00806

延伸閱讀