1 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management 資訊安全政策與管理 資訊安全政策與管理 Information Security.

Slides:



Advertisements
Similar presentations
高考短文改错专题 张柱平. 高考短文改错专题 一. 对短文改错的要求 高考短文改错的目的在于测试考生判断发现, 纠正语篇中 语言使用错误的能力, 以及考察考生在语篇中综合运用英 语知识的能力. 二. 高考短文改错的命题特点 高考短文改错题的形式有说明文. 短文故事. 书信等, 具有很 强的实用性.
Advertisements

期末考试作文讲解 % 的同学赞成住校 30% 的学生反对住校 1. 有利于培养我们良好的学 习和生活习惯; 1. 学生住校不利于了解外 界信息; 2 可与老师及同学充分交流有 利于共同进步。 2. 和家人交流少。 在寄宿制高中,大部分学生住校,但仍有一部分学生选 择走读。你校就就此开展了一次问卷调查,主题为.
考研英语复试 口语准备 考研英语口语复试. 考研英语复试 口语准备 服装 谦虚、微笑、自信 态度积极 乐观沉稳.
2014 年上学期 湖南长郡卫星远程学校 制作 13 Getting news from the Internet.
FAQ :住宿規則 / Dormitory Regulations
Section B Period Two.
F1 VISA APPLICATION F1学生赴美留学签证申请流程.
Have you ever been to a zoo? zoo water park Have you ever been to a water park?
-CHINESE TIME (中文时间): Free Response idea: 你周末做了什么?
专题八 书面表达.
“Internet+” Business Innovation
Chinese hot pot - Harvard Project
Today – Academic Presentation 学术报告
附錄1 —— 《個人資料(私隱)條例》的釋義、原則及主要條文
物聯網安全 物聯網的應用安全開發生命週期與需求管理.
雅思大作文的结构 Presented by: 总统秘书王富贵.
2012高考英语书面表达精品课件:话题作文6 计划与愿望.
初中进阶 (2346 期 ) 1 版. 1. What types of bullying do you know about? Physical hitting, tripping, stealing and hair pulling Social telling other kids.
都市計畫概論論文概述及評論: 彰化高鐵站區域計畫
摘要的开头: The passage mainly tells us sth.
How can we be a member of the Society? You should finish the following tasks if you want to be a member of the Birdwatching Society.
云实践引导产业升级 沈寓实 博士 教授 MBA 中国云体系产业创新战略联盟秘书长 微软云计算中国区总监 WinHEC 2015
Unit 2 Topic 2 What does she look like? Section D 龙岩初级中学 余军.
Homework 4 an innovative design process model TEAM 7
Unit 4 I used to be afraid of the dark.
Doris 金梦 -----Vice President of People Development
I always like birthday parties.
Ericsson Solutions for Intelligent Transport Systems and Solutions
CJLR PDM&SRM 单点登录指南 场景一:在CJLR公司网络中(CJLR办公室/由VPN拨入),使用CJLR公司电脑登录:
活在神的豐富中 Part 3 (下) By REV. DR. JOHN SIM.
The Meditation (dhyan) world
企业目标, 风险与内部控制 - 通过风险管理实现企业目标
Unit title: 爱好 Hobbies Area of interaction focus Significant concepts
加州協調護理計畫 洛杉磯縣.
Area of interaction focus
中国公私合作伙伴关系(PPP )现状 Disclaimer:
Guide to Freshman Life Prepared by Sam Wu.
課務組 Curriculum Section
China Standardization activities of ITS
G10 PARENT MEETING COURSE SELECTION 高一选课家长会 PRESENTED BY B
Area of interaction focus
The Issue of Information Security Management 資安管理專題
微软新一代云计算 面向企业的 Office 365 客户培训大纲
客户服务 询盘惯例.
Unit title: 日常生活和衣服 Daily life and clothes Area of interaction focus
Chapter 3 Nationality Objectives:
农村居民的信息需求与获取渠道研究 ——以云南省腾冲县为个案
Business Letters & Correspondence
Could you please clean your room?
解读设题意图,探究阅读策略 年高考试卷题型(阅读理解)分析及对策
Microsoft SQL Server 2008 報表服務_設計
IBM SWG Overall Introduction
Sensor Networks: Applications and Services
2 GROUP 身體殘障人士 傷健共融—如何改善肢體殘障人士的生活素質
Unit 8 Our Clothes Topic1 What a nice coat! Section D 赤峰市翁牛特旗梧桐花中学 赵亚平.
BORROWING SUBTRACTION WITHIN 20
Changhua University of Education
資訊安全概論 Introduction to Information Security
虚 拟 仪 器 virtual instrument
中央社新聞— <LTTC:台灣學生英語聽說提升 讀寫相對下降>
Cisco Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
第十二章 名詞子句 陳巧芬 賴孟屏 林珮雯.
中考英语阅读理解 完成句子命题与备考 宝鸡市教育局教研室 任军利
高考应试作文写作训练 5. 正反观点对比.
11 Overview Cloud Computing 2012 NTHU. CS Che-Rung Lee
怎樣把同一評估 給與在不同班級的學生 How to administer the Same assessment to students from Different classes and groups.
Area of interaction focus
Website: 第1章 密码学概论 Website: 年10月27日.
Start today. Change tomorrow.
China’s most famous “farmer”
Presentation transcript:

1 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management 資訊安全政策與管理 資訊安全政策與管理 Information Security Policy and Management Prof. Henry Chang February 25, 2016

2 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management CONTENTS Introduction of this course Introduction of this course Course illustration Course illustration Q & A Q & A

3 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Some introduction of this course Some introduction of this course 1). Information security policy has his ideas, even some other topics to describe with all graduate students. 2). The contents will include some topics, like purpose, aims and commitments, responsibilities, risk assessment and the classification of information, protection of information systems and assets, protection of confidential information, compliance, and other relevant university policies or guidance. 3). This policy provides a framework for the management of information security through out the environment.

4 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management They describe that [1]: 1). All those with access to information systems, including staff, students, visitors and contractors; ; 2). Any systems attached to the computer or telephone networks and any systems supplied by the environment ; 3). All information (data) processed by the pursuant to its operational activities, regardless of whether it is processed electronically or in paper (hardcopy) form; 4). All external parties that provide services in respect of information processing facilities and business activities; [1]

5 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management 5). Principal information assets including the physical locations from which the environment operates. Information security, InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take.[2] Business security has the same requirement as the information security want to make and defend. [2]s://en.wikipedia.org/wiki/Information_security

6 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Information technology (IT) assurance that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Threats let computer system come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

7 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Like the People's Liberation Army Unit (PLA 61398) is the true unit, which will make some intrusions to any foreign defenses. We can understand PLA should a group you have to notice, since the PLA can derive any security attack to you units. US New Secret Service Security Lapse Uncovered [3] [3]

8 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Business uses network as shown in following as: Business uses network as shown in following as: All connections for business communication will provides by networks, especial the Internet of Things (IoT) is the same.

9 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Currently, there is a World Internet Conference, held in WuzHen ( 乌鎮 ), China, Xi Jinping ( 習近平總書記 ) gives some support fro IoT comments. Taiwan has a lot of technologies on IoT, some leaders have their capabilities to pursue functions to support this IoT requirements. Such as Terry Kou ( 郭台銘 ), Jason Chang ( 張虔生 ) can be examples. IoT notices some connections from Internet, the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, enables to collect and exchange data. [4] [4]

10 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management 資訊安全政策與管理課程資訊 - Course Information 資訊安全政策與管理課程資訊 - Course Information 資訊安全政策與管理課程資訊 - Course Information 資訊安全政策與管理課程資訊 - Course Information 資訊安全政策與管理 課程大綱 -Course Syllable 資訊安全政策與管理 課程大綱 -Course Syllable 資訊安全政策與管理 課程大綱 -Course Syllable 資訊安全政策與管理 課程大綱 -Course Syllable 資訊安全政策與管理 課程進度 -Course Progress Outline 資訊安全政策與管理 課程進度 -Course Progress Outline 資訊安全政策與管理 課程進度 -Course Progress Outline 資訊安全政策與管理 課程進度 -Course Progress Outline Course illustration

11 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Notice please I wish to all graduate students siting at seat and give information as like:   Serial number, 中文, Reachable address, Dormitory phone, M-phone, ID-number ( 身分證號碼 )   TA needs to provide my idea of “Serial number, graduate student name, topics, dates, comments” on this form.   A table you still to provide as you get a paper to report. TA can give me by before 3/3, you need to use computer to type, but not pencil. Any one has to report by English, no Mandarin. All graduate students can discuss other, I will point out your understands.

12 報告人:張克章教授 資訊安全 政策與管理 Dept. Information Management Chang Gung University Information security policy and management Question And Answer