文化大學機構典藏 CCUR:Item 987654321/53630
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46833/50693 (92%)
Visitors : 11867938      Online Users : 692
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/53630


    Title: 威脅情資生命週期初探
    An Exploratory Study on the Lifecycle of Threat Intelligence
    Authors: 陳金鐘
    CHEN, JIN-JON
    Contributors: 資訊管理學系碩士在職專班
    Keywords: 威脅情資
    威脅情報
    威脅情資分享
    生命週期
    螺旋式生命週期
    資安資訊分享與分析中心
    威脅情資平台
    threat intelligence
    threat information
    threat intelligence sharing
    lifecycle
    spiral lifecycle
    information sharing and analysis center
    threat intelligence platform
    Date: 2024
    Issue Date: 2024-11-12 15:00:53 (UTC+8)
    Abstract: 隨著網路攻擊技術的發展和日益嚴峻的安全威脅,政府成立了資安資訊共享與分析中心(ISAC),透過資訊分享和回饋機制增強成員的防禦能力。本研究探討個案組織如何確認威脅情資的終結或緩解並提出改進建議。研究方法包括文獻回顧、資訊安全領域的個案生命週期比較、個案組織處理威脅情資的流程分析、威脅情資生成業者訪談等,建立並確認威脅情資生命週期架構。
    研究結果表明,兩個組織的威脅情資生命週期高度相似,時間可以用來驗證情資的有效性並確認情資的終結或緩解。本研究有四點貢獻:一、基於個案組織面臨的實際問題,提出了威脅情資生命週期,明確了威脅情資生命週期各階段的業務內容和工作項目;二、針對日益累積的威脅態勢,提出終結或緩解威脅情資的具體方法;三、整合威脅情資生成業者和個案組織的威脅情資生命週期,提出螺旋式威脅情資生命週期;四、研究結果能夠回應本研究的動機和目的。對於個案組織在處理威脅情資時面臨的七個問題的解決或緩解方法,可以在其相對應階段使用本研究成果的螺旋式威脅情資生命週期,尋找解決或緩解這七個問題的方法。
    With the development of cyber-attack technology and increasingly severe security threats, the government established the Information Sharing and Analysis Center (ISAC) to enhance members' defense capabilities through intelligence sharing and feedback mechanisms. This study investigates how case organizations confirm the ter-mination or mitigation of threat intelligence and recommends improvements. Research methods include literature review, case life cycle comparison in network security, analysis of the process of handling threat intelligence by case organizations, interviews with threat intelligence generators, etc., to establish and confirm the threat intelligence life cycle framework.
    The research results show that the threat intelligence life cycle of the two organi-zations is highly similar. Time can be used to verify the intelligence's effectiveness and confirm the intelligence's termination or mitigation. This study makes four contribu-tions: 1. Based on the practical problems faced by the case organization, the threat in-telligence life cycle is proposed, and the business content and work items of each threat intelligence life cycle stage are clarified; 2. In response to the increasingly ac-cumulated threat situation, we propose specific methods for ending or mitigating threat intelligence; 3. Integrating the threat intelligence life cycle of threat intelligence gen-erators and threat intelligence processing organizations and proposing a "Spiral threat intelligence life cycle." 4. The research results can respond to the motivation and pur-pose of this study. For the solutions or relief methods to the seven problems faced by the case organization when dealing with threat intelligence, the spiral threat intelli-gence lifecycle through the results of this research can be used in its corresponding stages. Find ways to resolve or soothe these seven problems.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] Thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML44View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback