Dissertations / Theses on the topic 'Security and efficiency of information system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security and efficiency of information system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Vránová, Nikola. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223423.
Full textParolek, Pavel. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223500.
Full textUrban, Petr. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223610.
Full textKůgel, Roman. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223433.
Full textCherynová, Nikol. "Posouzení informačního systému společnosti a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402607.
Full textKarlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.
Full textHanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
Malá, Eva. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223882.
Full textIgbonagwam, Okey Azu. "The Role of Security Clearance, Users' Involvement, and Computer Self-Efficacy in the Efficiency of Requirements-Gathering Process: An Information-Systems Case Study in the U.S. Military." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/184.
Full textKouřil, Martin. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223283.
Full textČernín, Ondřej. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318316.
Full textMatis, Peter. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241436.
Full textKubala, Michal. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223817.
Full textFloriano, Sanchez Sergio. "A Self-organized Wireless Sensor Network (WSN) for a Home-event Managed System : Design of a cost efficient 6LoWPAN-USB Gateway with RFID security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186384.
Full textTrådlösa sensornätverk har funnits i många år inom industrin för olika ändamål, men dess användning har inte helt och hållet nått ut till de globala konsumenterna. Sensornätverk har på senare tid visat sig vara mycket hjälpfulla för människor i deras vardagsliv, och särskilt automatiseringsapplikationer för säkerhet, övervakning och kontroll av apparater och olika delar i huset, genom användning av manöverdon. Ett av de huvudsakliga hindren att ta sig förbi för att kunna öka dess popularitet och skapa en världsomfattande spridning är kostnader, integration inom andra nätverk och en enkel hantering. I den här avhandlingen undersöks vilka som är de lämpligaste alternativen för att undvika hinder ur ett hårdvaru- och mjukvarudesigns-perspektiv, genom att försöka hitta kostnadseffektiva lösningar för implementering av ett trådlöst sensornätverk. Arbetet undersöker de beståndsdelar vilka ett begränsat nätverk består av, samt fokuserar på designen genom att analysera flera olika nätverksprotokollsalternativ, radiosändningsmekanismer, olika hårdvaror och implementering av mjukvara. När väl den optimala lösningen hittats, kommer huvudmålet för detta dokument att vara en gateways konstruktion, vilken sätter igång och koordinerar ett sensornätverk, samt utvecklingen av en applikation som sköter sensorerna. Nätverket är designat för att vara medgörligt med TCP/IP-stacken med hjälp via 6LoWPAN, ett anpassat lagerprotokoll vilket används för att komprimera IPv6-headern i begränsade nätverk över IEEE 802.15.4 radionätverk. Dessutom har en liten implementering av CoAP (Constrained Application Protocol) utvecklats vilket tillåter interoperabilitet med sensornoderna i applikationslagret, liknande HTTP i IP-nätverk. Gatewayen fungerar som en klient för sensornoderna, vilka beter sig som servrar i CoAP-applikationen. Gatewayen utbyter data och styrs utifrån det trådlösa sensornätverket genom ett USB-interface som kan kopplas till datorn. Säkerhetskonstruktioner tas också i akt genom att tillhandahålla kryptering och en metod för att identifiera noder. Behörighet för nya noder i nätverket utförs av en RFID-läsare som är kopplad till gatewayen. En RFID-bricka bifogas sensornoderna med lagrad verifieringsinformation. Porten läser den informationen genom RFID-moduler och hanterar den internt för att ge behörighet till noden. I och med detta är det bevisat, med den implementerade gatewayen och slutsatser från studien, att mycket effektiva, billiga och hanterbara trådlösa sensornätverk med kraftiga säkerhetskonstruktioner kan uppnås och enkelt distribueras. Arbetet som presenteras i det här dokumentet är en del av ett större projekt som också inkluderar uppbyggnaden av sensornoderna samt anskaffning och analys av sensordata. Dessa arbeten nämns och refereras till i de berörda delarna av texten.
Coetzee, Dirk Badenhorst. "The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80292.
Full textENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to broadcast the same collection of information to several receiving parties while only allowing a certain subset of the receiving parties to access the information. This system must still be secure in the scenario where all receiving parties who are not allowed access to the information, pool their resources in an attempt to gain access to the information. Such a product entitlement system must also be bandwidth e cient since it can be deployed in networks where bandwidth is at a premium. The foundations of modern encryption techniques is reviewed and a survey of existing techniques, used to secure content in broadcast environments, is studied. From this collection of techniques two were identi ed as bandwidth e cient and are discussed in more detail before being implemented. An attempt is then made to design a new secure bandwidth e cient encryption scheme for protecting content in a broadcast environment. Several iterations of the design is detailed, including the security aw which makes each design insecure. The nal design was implemented and compared in several metrics to the two previously selected bandwidth e cient schemes. A framework to test the correctness of the schemes over a network is also designed and implemented. Possible future avenues of research are identi ed with regards to creating a secure broadcast encryption scheme and improving the software solution in which to use such a scheme.
AFRIKAANSE OPSOMMING: 'n Veilige produk-aanspraak-stelsel stel een party, soos byvoorbeeld 'n betaal-TV-operateur, in staat om dieselfde versameling inligting na verskeie partye uit te saai, terwyl slegs 'n bepaalde deelversameling van die ontvangende partye toegelaat sal word om toegang tot die inligting te bekom. Hierdie stelsel moet steeds die inligting beskerm in die geval waar al die ontvangende partye wat toegang geweier word, hul hulpbronne saamsmee in 'n poging om toegang te verkry. So 'n produk-aanspraak-stelsel moet ook bandwydte doeltre end benut, aangesien dit gebruik kan word in netwerke waar bandwydte baie duur is. Die fondamente van die moderne enkripsietegnieke word hersien. 'n Opname van bestaande tegnieke wat gebruik word om inligting te beskerm in 'n uitsaai omgewing word bestudeer. Uit hierdie versameling tegnieke word twee geïdenti seer as tegnieke wat bandwydte doeltre end benut en word meer volledig bespreek voordat dit geïmplementeer word. 'n Poging word dan aangewend om 'n nuwe veilige bandwydte doeltre ende enkripsietegniek te ontwerp vir die beskerming van inligting wat uitgesaai word. Verskeie iterasies van die ontwerp word uiteengesit, met 'n bespreking van die sekuriteitsfout wat elke ontwerp onveilig maak. Die nale ontwerp is geïmplementeer en aan die hand van verskeie maatstawwe vergelyk met die twee bandwydte doeltre ende tegnieke, wat voorheen gekies is. 'n Raamwerk om die korrektheid van die tegnieke oor 'n netwerk te toets, is ook ontwerp en geïmplementeer. Moontlike toekomstige rigtings van navorsing word geïdenti seer met betrekking tot die skep van 'n veilige uitsaai enkripsietegniek en die verbetering van die sagtewareoplossing wat so 'n tegniek gebruik.
Neuwirth, Bernard. "Problematika hodnocení optimality a vyváženosti podnikových IS." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-233719.
Full textKalužík, Jakub. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223428.
Full textDominik, Jan. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223616.
Full textTrinh, Ngoc Minh. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444570.
Full textYucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textCrémilleux, Damien. "Visualization for information system security monitoring." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0013.
Full textA security operations center, SOC, is a key element for the security of information systems. In this thesis, weexhibited the limitations of SOCs and proposed a process associated with two tools to answer them. Ourcontributions enable a better collaboration between the security analysts working in SOCs and facilitate securityevents triage thanks to visualization
Mahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.
Full textmuqadas@gmail.com
Kostrhoun, Ivo. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223435.
Full textZhang, Kaijin ZHANG. "Efficiency and security in data-driven applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textErkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.
Full textInfoSec Toolkit&rdquo
, which is developed for this purpose in the thesis scope, is given. &ldquo
InfoSec Toolkit&rdquo
is based on ISO/IEC 27001:2005 and ISO 17799:2005. Five basic integrated modules constituting the &ldquo
InfoSec Toolkit&rdquo
are &ldquo
Gap Analysis Module&rdquo
, &ldquo
Risk Module&rdquo
, &ldquo
Policy Management Module&rdquo
, &ldquo
Monitoring Module&rdquo
and &ldquo
Query and Reporting Module&rdquo
. In addition a research framework is proposed in order to assess the public and private organizations&rsquo
information security situation in Turkey.
Coles-Kemp, Elizabeth. "The anatomy of an information security management system." Thesis, King's College London (University of London), 2008. https://kclpure.kcl.ac.uk/portal/en/theses/the-anatomy-of-an-information-security-management-system(08ef0714-a5aa-4b6e-b322-8a174da6a2b9).html.
Full textScully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.
Full textBachelors
Business Administration
Management Information Systems
Alqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.
Full textAndersson, Rikard. "A Method for Assessment of System Security." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4386.
Full textWith the increasing use of extensive IT systems for sensitive or safety-critical applications, the matter of IT security is becoming more important. In order to be able to make sensible decisions about security there is a need for measures and metrics for computer security. There currently exist no established methods to assess the security of information systems.
This thesis presents a method for assessing the security of computer systems. The basis of the method is that security relevant characteristics of components are modelled by a set of security features and connections between components are modelled by special functions that capture the relations between the security features of the components. These modelled components and relations are used to assess the security of each component in the context of the system and the resulting system dependent security values are used to assess the overall security of the system as a whole.
A software tool that implements the method has been developed and used to demonstrate the method. The examples studied show that the method delivers reasonable results, but the exact interpretation of the results is not clear, due to the lack of security metrics.
Pattabiraman, Prashanth. "Energy Efficiency of Streaming over Mobile Ad-hoc Networks." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10911.
Full textSharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 124-130).
There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, firewalls, and spam filters. There is no doubt in the fact that significant progress has been made in the technological side of information security. However, when we study causes of information security breaches, we find that a significant number are caused by non-technical reasons such as social engineering, theft of computing device or portable hard drive, human behavior, and human error. This leads us to conclude that information security should not be viewed through technology perspective only. Instead, a more holistic approach is required. This thesis provides a systems approach towards information security management and include technological, management and social aspects. This thesis starts with introduction especially background and motivation of the author, followed by literature research. Next, Enterprise Information Security Management Framework is presented leading to estimation of an organization's information security management maturity-level. Finally, conclusion and potential future work are presented.
by Dhirendra Sharma.
S.M.in Engineering and Management
Stevenson, James V. "An Enterprise Information System for the Naval Security Group." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA343496.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textZhang, Xiang. "Efficiency in Emergency medical service system : An analysis on information flow." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1620.
Full textIn an information system which includes plenty of information services, we are always seeking a solution to enhance efficiency and reusability. Emergency medical service system is a classic information system using application integration in which the requirement of information flow transmissions is extremely necessary. We should always ensure this system is running in best condition with highest efficiency and reusability since the efficiency in the system directly affects human life.
The aim of this thesis is to analysis emergency medical system in both qualitative and quantitative ways. Another aim of this thesis is to suggest a method to judge the information flow through the analysis for the system efficiency and the correlations between information flow traffic and system applications.
The result is that system is a main platform integrated five information services. Each of them provides different unattached functions while they are all based on unified information resources. The system efficiency can be judged by a method called Performance Evaluation, the correlation can be judged by multi-factorial analysis of variance method.
Meng, Huan. "Security Architecture and Services for The Bitcoin System." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177022.
Full textKeighren, Gavin. "Restricting information flow in security APIs via typing." Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/8963.
Full textAbdelhafez, Amr Abdelhafez Mohamed Alanwar [Verfasser], Matthias [Akademischer Betreuer] Althoff, Matthias [Gutachter] Althoff, and Joao P. [Gutachter] Hespanha. "Localization of Cyber-Physical Systems: Privacy, Security and Efficiency / Amr Abdelhafez Mohamed Alanwar Abdelhafez ; Gutachter: Matthias Althoff, Joao P. Hespanha ; Betreuer: Matthias Althoff." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/120883178X/34.
Full textFogla, Prahlad. "Improving the Efficiency and Robustness of Intrusion Detection Systems." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19772.
Full textAl, Mayahi Ibrahim Humaid. "Development of a comprehensive information security system for UAE e-Government." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/development-of-a-comprehensive-information-security-system-for-uae-egovernment(190cd7ed-2d1d-4805-963a-5f6d1dc46971).html.
Full textTyali, Sinovuyo. "An integrated management system for quality and information security in healthcare." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1006670.
Full textMinh, Doan Quang, and 段光明. "Implementing and Improving Efficiency of Information Security System at National Economics University, Vietnam." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/72544955090332371998.
Full text樹德科技大學
資訊管理研究所
95
This thesis demonstrates a model of procedures and consideration of applying ISO 17799 to the implementation of information security system at National Economics University, Vietnam (NEU). We also apply Balanced Scorecard to ensure that the strategy of implementation can be achieved. The thesis not only describes the importance of proper information protection, gives examples of threats that can cause risk of major looses, as well as safeguards and controls that can reduce the risk of information system incidents, but also emphasizes the need for applying Balanced Scorecard to improve efficiency of information security system. The main part of this thesis presents guidelines for implementing information security system in general as well as at NEU based on recommendations of ISO 17799. This thesis also presents steps for Balanced Scorecard building and implementation at NEU. From this thesis we found that Balanced Scorecard can improve efficiency of information security system at NEU. The model can be applied to most of industries that implement information security system for business administrations.
Tsai, Wen-Jian, and 蔡文健. "Security Architecture of Information System." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/40244757640392254501.
Full text國立臺灣大學
資訊管理學系
85
With the growth of Internet and Intranets, and the emerging of Java and other Internet technologies, network computing promises to play a key role in the evolving corporate computing environment. Although organizations will benefit from this paradigm shift, they will face many difficulties and problems when dealing with security concerns. To tackle this problem, we propose a security architecture for the design and development of information systems in this study.There are two layers in the proposed security architecture. The first (bottom) layer provides Message Secrecy and Authentication Service, which helps isolate information systems from threats arisen from the communication network. The communication security requirements are secrecy (or confidentiality), integrity, authentication, and non-repudiation. The most important technology that helps fulfill these requirements is cryptography through the combinations of message encryption and decryption, timestamps and massage authentication codes.For the purpose of resources management and protection, the second (top) layer provides Distributed Access Control Service. Since users and resources could be in different locations in a distributed system, a good mechanism that provides powerful, flexible, and uniform access control is desirable. A Permission model for distributed access control is proposed for this purpose. The Permission model has following features:1. The Permission model integrates other access control models, including Access Matrix Model, Role- based Access control Model, and Proxy-based Authorization Model, into a uniform model suitable for a distributed environment.2. To determine whether a user can use a resource, the permission model makes the decision based on what permissions the user possesses rather than the user''s identity.3. Authorization decisions and resources control are two separate functions. Authorization managers are responsible for deciding what resources users can use, whereas resources managers give resources to authorized users.4. Authorization information need not be centralized; it is kept by individual authorization managers, allowing decentralized decision making with better scaleability.The Permission model allows the specification of negative authorization and authorization constraints, making it possible to state an organization''s security policy with ease and accuracy.
Sun, Jean-huan, and 孫震寰. "Information Security Risk Assessment of Bancassurance Information System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/53053857178291666972.
Full text銘傳大學
風險管理與保險學系碩士在職專班
97
Information technology has been a key role in organizations and enterprises of nowadays to bring better operation efficiencies. As the internet is making accessing to information easier, it is also exposing the enterprises to higher risks. The report from III is indicating that information security is crucial to the operation of financial institutions. The Bancassurance in Taiwan now have become a significant selling channel for insurance products in last decade. Admirably, the banks and its subsidiaries like China Trust Insurance Brokers Co., overwhelmed all the insurance companies in premium commission income since 2004. Bancassurance, and its information security are therefore becoming worthwhile topics for related research. This article brings an extensive evaluation over 46 bancassurance agencies. The survey introduced the process developed by Taiwan’s Ministry of Economic Affairs for assessing the security level of information systems in SME. This article intends to discover the major elements that a comprehensive security strategy should be taking care of in its development process. The interactions of these elements are also explored. Both the methodologies of quantitative (with frequency and damage estimation) and descriptive (for risk perception) are used in the survey. A summary is developed for how to strategize the information security policy with evaluation results. The survey indicates the network security brings the most problems to the overall information security, while the government regulation brings the least. The survey also finds higher the damage that a problem causes, more the awareness from the administrator of it. The survey shows the MIS managers and staffs have insufficient knowledge with information security. They very often under-estimate the probability and damage of network security problems, and over-estimate the influences from other elements. For the Information security strategy of Taiwan’s bancassurance enterprises, this article suggests ‘prevention’ policy to deal with problems in computer security, business application systems and network security, ‘prevention’ and ‘transferring’ policy for problems of staff security and outsource management, and ‘acceptance’ policy for requirement of regulations. It is highly recommended to reinforce the knowledge level of MIS crews and the general management. Risk perception is a convenient tool to determine the comprehensiveness of information security of an enterprise. It plays key role both in the policy making of risk management, and also in the process for related communication within the enterprise.
Venter, Diederik Petrus. "Infosure: an information security management system." Thesis, 2008. http://hdl.handle.net/10210/520.
Full textProf. S.H. Solms
Peng, Cheng Jun, and 彭成鈞. "A healthcare information system with strengthened security." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/10241896630944711096.
Full text長庚大學
資訊管理學研究所
97
As a society of aging demographics comes, information and communication technologies applied to public healthcare are emerging. However, one issue of wireless networks and the internet is the relatively weak security. It is important to pay attention to the issue of protecting the privacy of personal data. This study proposes a healthcare system that satisfies the needs and enhances data security. The design aims to construct a healthcare system for satisfying both convenience and safety. The investigation of this thesis provides hospitals with an understanding on the benefits of this system. The investigation of this thesis further provides the general public with an understanding on the convenience and safety of the system. The system maintains the privacy of medical information and advocates immediate and sufficient healthcare.
ling, cheng kui, and 鄭桂凌. "ZigBee Information System for wireless home security." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/83278071727485255557.
Full text亞洲大學
資訊工程學系碩士班
95
ZigBee is one of application of wireless personal area network technology. The current protocol is IEEE 802.15.4, that is a Low-rate, Wireless Personal Area Network (LR-WPAN) structure. It has a number of specific features such us low rate, short distance, low power, structure simple, low cost, and small size. The research is to employ the advanced wireless transmission technology of ZigBee to transmit signal as well as to monitor and control the platform that whether will be activated or not. Should the events of fire alarm be trigged, carbon monoxide and fall occurs. In order to prevent the further damages in case of fire alarm, carbon monoxide and fall, ZigBee will be built as one of economic Home Safety Information System. The sensors that we adapted can be adjusted to meet the requirements of environment changes. With respect to transmit signals, we apply a current most challenge wireless technology to serve not only small group of researchers or new product seekers but all who want to know the convinence of and to acquire the wireless technology. The research in to advocate the low cast ZigBee technology. It’s ultimate goal is to reduce the cost of a ZigBee chip to one US dollar. It will no longer belong to the wealth people but to all who get used to the high price of 3C product, Therefore the ZigBee will then be easily accepted by the people who love and so does the whole world.
YAO, WEI-CHIEH, and 姚維杰. "IoT Service System Information Security Analysis Platform." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/q27sn9.
Full text崑山科技大學
資訊工程研究所
107
With the investment of developers and the industry, the Internet of Things has gradually developed applications. It plays a very important role in life management, environmental monitoring, car networking, home security and smart cities. The Internet of Things uses various things through the Internet. Linked to make it easier for people to access information and use more convenient services, and the information security of the Internet of Things is also closely followed. If the IoT system is attacked by information security, the attacker can not only peep into the user's habits. , location, personal data and images, and even the transmission of fake data may make the system make a wrong decision. Therefore, an information security detection platform for the Internet of Things service system will be developed. The detection platform is presented by the web interface, providing easy operation for non- information related background users and easy to interpret. The detection content is divided into three parts. First, the first part is on the Internet of Things service system. The IoT service system enables service scanning, which allows users to know whether the service system has additional information to open the communication and cause potential risks. The collected data can also provide the second part of analyzing SSL (Transport Layer Security Agreement Transport Layer) Security) credentials. The purpose of analyzing the SSL certificate is to check whether the IoT service system provides SSL encryption for verification. SSL is also called secure communication protocol. The network packet transmission can be encrypted through SSL, so that the transmitted content cannot be obtained even if it is intercepted. SSL encryption, the user's personal information, account number, password and credit card information will be easily intercepted during the transmission process. The third part is to do a weak point scan on the IoT service system, and provide information to the user service system about potential risks and repair methods.
Chou, Shin-I., and 周世益. "System Security Evaluating-based on Vulnerability Information." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/24596483513137570117.
Full text國防大學中正理工學院
資訊科學研究所
96
According to National Vulnerability Database, the statistics show that there are seventeen new vulnerabilities published per day. These vulnerabilities found in the operation systems and applications software may be exploited with those unknown attack methods. Users, therefore, have to maintain the latest information of vulnerabilities in order to prevent the systems from being attacked. The vulnerability information can also be used to evaluate the security of the software environments in the cases of constructing new systems via examining operation systems and applications. Our evaluation system can help the users propose the solutions against those potential threats. The information of the security vulnerabilities can be obtained by using our system to analyze the cases of the software combo on new host. Besides, our evaluation also provides other, such as the potential attack methods, the types of the vulnerabilities and the integrated evaluating results. With these, users can evaluate the different combos of the host software selection via comparing the advantages and disadvantages of the combos for choosing the most suitable one. Our evaluation system has another function to evaluate these constructed hosts. The generated evaluation reports can help users understand the vulnerabilities on and the potential risks to their hosts. With referring the information, users can adjust the security configurations of their hosts, deploy some network-security devices for the high risk hosts, and establish the more secure defense strategy. The main purpose of our research is in evaluating the security of the information systems for constructing and constructed hosts. Our evaluation system is based on the CVSS in NVD database and CVE database. The text mining techniques are also introduced for analyzing the host vulnerabilities leading to the potential risk scenarios. The evaluation results can help users in establishing the security policies in using systems, modifying the configurations of the systems, determining the patching orders of the critical vulnerabilities, selecting the suitable combo of new host, deploying the network security devices to improve the security of the information systems and reduce the risks of being attacked in the intranet or via internet.
Lei, Cheng-Chiu, and 雷誠久. "Information Security Management System for the Hospital." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/3fyzjb.
Full text國立東華大學
資訊工程學系
95
Digitalization jeopardizes information security wherever it is applied, and hospitals are not an exception. The information they possess is very personal, while the trust between the patient and the hospital is one basic factor for quality care. Therefore hospital information security and privacy are major issues that cannot be ignored. This research uses case study methods to observe and understand the information security management system of our research subject. We used a four point scoring survey that was developed on the basis of “ISO/IEC 27001”to develop models that could verify their information security management systems. Our research subject was the first hospital under the jurisdiction of the Department of Health and the first in Taiwan to receive an ISO/IEC 27001:2005 certificate. Therefore, their information security management is very good and can be viewed as a standard for others to follow. We have come up with some extremely constructive suggestions via our extensive research. These suggestions and experience will be presented to our hospital, provided to future researchers, and serve as reference for those that wish to use such a system.