文化大學機構典藏 CCUR:Item 987654321/53630
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46833/50693 (92%)
造访人次 : 11868141      在线人数 : 552
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/53630


    题名: 威脅情資生命週期初探
    An Exploratory Study on the Lifecycle of Threat Intelligence
    作者: 陳金鐘
    CHEN, JIN-JON
    贡献者: 資訊管理學系碩士在職專班
    关键词: 威脅情資
    威脅情報
    威脅情資分享
    生命週期
    螺旋式生命週期
    資安資訊分享與分析中心
    威脅情資平台
    threat intelligence
    threat information
    threat intelligence sharing
    lifecycle
    spiral lifecycle
    information sharing and analysis center
    threat intelligence platform
    日期: 2024
    上传时间: 2024-11-12 15:00:53 (UTC+8)
    摘要: 隨著網路攻擊技術的發展和日益嚴峻的安全威脅,政府成立了資安資訊共享與分析中心(ISAC),透過資訊分享和回饋機制增強成員的防禦能力。本研究探討個案組織如何確認威脅情資的終結或緩解並提出改進建議。研究方法包括文獻回顧、資訊安全領域的個案生命週期比較、個案組織處理威脅情資的流程分析、威脅情資生成業者訪談等,建立並確認威脅情資生命週期架構。
    研究結果表明,兩個組織的威脅情資生命週期高度相似,時間可以用來驗證情資的有效性並確認情資的終結或緩解。本研究有四點貢獻:一、基於個案組織面臨的實際問題,提出了威脅情資生命週期,明確了威脅情資生命週期各階段的業務內容和工作項目;二、針對日益累積的威脅態勢,提出終結或緩解威脅情資的具體方法;三、整合威脅情資生成業者和個案組織的威脅情資生命週期,提出螺旋式威脅情資生命週期;四、研究結果能夠回應本研究的動機和目的。對於個案組織在處理威脅情資時面臨的七個問題的解決或緩解方法,可以在其相對應階段使用本研究成果的螺旋式威脅情資生命週期,尋找解決或緩解這七個問題的方法。
    With the development of cyber-attack technology and increasingly severe security threats, the government established the Information Sharing and Analysis Center (ISAC) to enhance members' defense capabilities through intelligence sharing and feedback mechanisms. This study investigates how case organizations confirm the ter-mination or mitigation of threat intelligence and recommends improvements. Research methods include literature review, case life cycle comparison in network security, analysis of the process of handling threat intelligence by case organizations, interviews with threat intelligence generators, etc., to establish and confirm the threat intelligence life cycle framework.
    The research results show that the threat intelligence life cycle of the two organi-zations is highly similar. Time can be used to verify the intelligence's effectiveness and confirm the intelligence's termination or mitigation. This study makes four contribu-tions: 1. Based on the practical problems faced by the case organization, the threat in-telligence life cycle is proposed, and the business content and work items of each threat intelligence life cycle stage are clarified; 2. In response to the increasingly ac-cumulated threat situation, we propose specific methods for ending or mitigating threat intelligence; 3. Integrating the threat intelligence life cycle of threat intelligence gen-erators and threat intelligence processing organizations and proposing a "Spiral threat intelligence life cycle." 4. The research results can respond to the motivation and pur-pose of this study. For the solutions or relief methods to the seven problems faced by the case organization when dealing with threat intelligence, the spiral threat intelli-gence lifecycle through the results of this research can be used in its corresponding stages. Find ways to resolve or soothe these seven problems.
    显示于类别:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML44检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈