:::

詳目顯示

回上一頁
題名:雲端運算服務之風險分析
書刊名:管理評論
作者:王平 引用關係羅濟群 引用關係趙國銘王子夏
作者(外文):Wang, PingLo, Chi-chunChao, Kuo-mingWang, Tzu-chia
出版日期:2012
卷期:31:1
頁次:頁1-19
主題關鍵詞:風險分析雲端運算雲端運算服務模糊派翠網Risk assessmentCloud computingCloud servicesFuzzy Petri Net
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(1) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:0
  • 點閱點閱:50
雲端運算(Cloud Computing)透過網際網路的連結,透過大型資訊平台佈署及提供資訊服務,但雲端上商業資料可能成為網路攻擊的目標,故如何消除企業對雲端運算服務(cloud services)之資安的疑慮,使企業對網際網路資料中心(Internet Data Center, IDC)的資訊安全管理產生信心,是導入雲端運算的重要事務。若企業忽視雲端運算服務的資訊風險,將可能造成隱私資訊外洩並嚴重影響商譽。因此,企業須要有一套營運風險分析方法,系統化評選IDC 所提出的解決方案;現有風險分析方法較適用於資訊資產個別威脅事件為基礎之風險分析,面對雲端運算作業採用分散式服務架構,須分析多重網路攻擊事件間之交互影響,故本風險模式改以資訊資產之作業流程為基礎,運用模糊派翠網(Fuzzy Petri Net, FPN)理論完整分析作業的威脅流程,估算資產之各項作業的風險,將原有風險分析導入動態運作環境,搭配ISO/IEC 27001之資訊安全管控,系統化分析資訊資產的風險。最後舉一雲端運算服務平台風險分析為例,說明所研提的方法,探討案例中分散式佈署及資訊更新時所帶來的風險。
Cloud computing adopts the Internet to deliver information services to open networks via deployment of large scale of platforms, in which commercial data on the clouds might become targets of network attacks. How to eliminate the worries about information security on cloud services, raise the confidences on information security management of IDC is a crucial issue in cloud computing. It might lead to disclosure of confidential information and serious damage to business reputation, if enterprises neglected assessing the risks of cloud services. Thus, enterprises need systemically assess the operational risks with the proposals of IDC by comparing distinct cloud provider solutions, when decided to adopt the cloud services. Available risk models are more suitable for assessing the risk of information assets based on a series of specific threat events. It is necessary to adjust the risk model to effectively assess the risks of cloud services via analyzing the effects of multiple interleaved attacks from the view of asset operation flow perspective. Therefore, a fuzzy risk assessment model is proposed to evaluate the risks of cloud security in a dynamic environment using Fuzzy Petri Net (FPN) by adopting ISO/IEC 27001 standard. Finally, an illustration case of risk assessment of cloud services in Internet Data Center (IDC) is given to demonstrate our approach. From numerical illustrations, our approach effectively outranks the risks of cloud services, especially when they are deployed and updated their information in a distributed deployment.
期刊論文
1.Carroll, J. M.(1983)。Decision support for risk analysis。Computers and Security,2(3),230-236。  new window
2.Orlovsky, S. A.(1978)。Decision Making with A Fuzzy Preference Relation。Fuzzy Sets and Systems,1,155-167。  new window
3.Chiclana, F.、Herrera, F.、Herrera-Viedma, E.(1998)。Integrating Three Representation Models in Fuzzy Multipurpose Decision-Making Based on Fuzzy Preference Relations。Fuzzy Sets and Systems,97(1),33-48。  new window
4.溫鳳棋(2003)。ISO/IEC Guide 73 : 2002(E/F) 風險管理--詞彙-標準使用指引。資訊安全論壇,11,33-40。  延伸查詢new window
5.羅濟群、王平、趙國銘(2006)。模糊群體決策環境下以OWA運算子進行風險評估。資管評論,14,1-2。  延伸查詢new window
6.Mehrez, A.、Muzumdar, M.、Acar, W.、Weinroth, G.(1995)。A Petri Net Model View of Decision Making: An Operational Management Analysis。Omega,23(Spring),63-78。  new window
7.Smolikova, Renata、Wachowiak, Mark P.(2002)。Aggregation Operators for Selection Problems。Fuzzy Sets and Systems,131(1),23-34。  new window
會議論文
1.Chen, Shyi-Ming、Ke, Jyh-Sheng、Chang, Jin-Fu(1990)。Knowledge Representation Using Fuzzy Petri Nets2(Fall),311-319。  new window
2.Guati, Bao Chyuan、Lo, Chi-Chun、Wang, Ping(2003)。Evaluation of Information Security Related Risks of An Organization- The Application of Multi-Criteria Decision-Making Method163-175。  new window
學位論文
1.劉永禮(2002)。以BS7799資訊安全管理規範建構組織資訊安全風險管理模式之研究(碩士論文)。元智大學。  延伸查詢new window
圖書
1.Haimes, Yacov Y.(1998)。Risk Modeling, Assessment, and Management。A Wiley-Interscience Publication, John Wiley & Sons, Ltd.。  new window
2.Koller, Glenn R.(2000)。Risk Assessment and Decision Making in Business and Industry: A Practical Guide。New York:CRC press。  new window
其他
1.Brodkin, J.。Gartner: Seven Cloud-computing Security Risks,http://www.networkworld.com/news/2008/070208-cloud.html, 2008/07/02。  new window
2.資策會(2010)。未採用雲端服務 資訊安全是疑慮。  延伸查詢new window
3.British Standards Institution(2002)。Information Security Management Systems-Part2: Specification with Guidance for Use (BS 7799-2)。  new window
4.Computer Security Institute(2009)。Computer Crime and Security Survey 2009。  new window
5.European Network and information Security Agency(2009)。Cloud Computing: Benefits, Risks and Recommendations for Information Security。  new window
6.Gottfrid, D.(2009)。Self-service, Prorated Super Computing Fun。  new window
7.International Organization for Standardization(2004)。Information Technology - Guidelines for the Management of IT Security-Part 1: Concept and Model for IT Security (ISO/IEC 13335-1)。  new window
8.International Organization for Standardization(2005)。Information Technology - Security Techniques Information Security Management Systems-Requirement (ISO/IEC 27001)。  new window
9.OWASP Foundation(2010)。OWASP Top Ten for 2010: The Ten Most Critical Web Application Risks。  new window
10.Ponemon Institute(2010)。Flying Blind in the Cloud: The State of Information Governance。  new window
11.Stoneburner, Gary,Goguen, Alice,Feringa, Alexis(2002)。Risk Management Guide for Information Technology Systems。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE