:::

詳目顯示

回上一頁
題名:企業導入雲端服務專案之風險評估
書刊名:商管科技季刊
作者:王平 引用關係柯文長 引用關係蕭雅文
作者(外文):Wang, PingKo, Wen-changShiau, Ya-wen
出版日期:2013
卷期:14:2
頁次:頁143-164
主題關鍵詞:風險評估雲端運算模糊集合模糊層級分析法Risk assessmentCloud computingFuzzy setsFuzzy analytic hierarchy processFAHP
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:65
雲端運算給資訊科技產業帶來商機,但亦帶來重大的挑戰。客戶願意採用雲端服務的前題是須確保客戶資訊安全。近期發生的網路進階持續性滲透攻擊(advanced persistent threat,APT)已導致客戶對導入雲端服務產生心理障礙。針對導入雲端服務所面臨的潛在風險問題,本研究提出一套風險評估方法,參考雲端安全聯盟(cloud security alliance,CSA)與歐洲網路與資訊安全局(European network and information security agency,ENISA)所提出的雲端服務之資訊安全架構,已決定導入雲端服務之風險項目,利用模糊層級分析法(fuzzy analytic hierarchy process,FAHP)合理評估與分析雲端服務之風險項目優先順序。所研提的方法與案例分析,有助於企業了解轉移應用程式至雲端服務的風險項目及控管優先順序,以利決定資安資源分配及降低系統導入後之潛在衝擊。
Cloud computing presents the IT industry not only with exciting opportunities, but also with significant challenges since consumers are reluctant to adopt cloud computing solutions in the absence of firm guarantees regarding the security of their information. Network attacks such as APT attacks present a serious obstacle to consumer acceptance of cloud service project nowadays. Accordingly, the present study proposes a project risk assessment scheme and constructs a risk evaluation matrix based on the security framework followed by both Cloud Security Alliance (CSA) and European Network and Information Security Agency (ENISA). In addition, the risk priorities of attributes are rationally evaluated by fuzzy analytic hierarchy process (FAHP) method in the risk assessment process. Overall, the results confirm that the proposed method provides an effective means of recognizing the risk attributes and their risk priorities, deciding the allocation of risk budget, and reducing the impact of potential risk for enterprises.
期刊論文
1.蔡一郎(2010)。雲端運算與雲端安全架構。資訊安全通訊,16(4),84-93。  延伸查詢new window
2.王平、林文暉、郭溥村、王子夏、盧永翔(20101000)。雲端運算服務之資安風險與挑戰。資訊安全通訊,16(4),45-65。  延伸查詢new window
3.黃富祿、張力允、李仁鐘、周碩聰(20101000)。組織導入雲端運算之資安管理評估。資訊安全通訊,16(4),66-83。  延伸查詢new window
4.鄭進興、陳堂昇(20101000)。公路監理服務雲端運算與資安管理。資訊安全通訊,16(4),94-111。  延伸查詢new window
5.Chauhan, A.、Vaish, R.(2012)。Magnetic material selection using multiple attribute decision making approach。Materials and Design,36,1-5。  new window
6.Chuu, S. J.(2009)。Group decision-making model using fuzzy multiple attributes analysis for the evaluation of advanced manufacturing technology。Fuzzy Sets and Systems,160(5),586-602。  new window
7.Kuo, R. J.、Wang, Y. C.、Tien, F. C.(2010)。Integration of artificial neural network and MADA methods for green supplier selection。Journal of Cleaner Production,18(12),1161-1170。  new window
8.Kutsch, E.、Hall, M.(2010)。Deliberate Ignorance in Project Risk Management。International Journal of Project Management,28(3),245-255。  new window
9.Mabuchi, S.(1993)。A proposal for a defuzzification strategy by the concept of sensitivity analysis。Fuzzy Sets and Systems,55(1),1-14。  new window
10.Marques, G.、Gourc, D.、Lauras, M.(2010)。Multi-criteria performance analysis for decision making in project management。International Journal of Project Management,29(8),1057-1069。  new window
11.Pang, J.、Liang, J.(2012)。Evaluation of the results of multi-attribute group fecision-making with linguistic information。Omega,40(3),294-301。  new window
12.Saaty, T. L.(1978)。Exploring the interface between hierarchies, multiple objectives and fuzzy sets。Fuzzy Sets and Systems,1(1),57-68。  new window
13.Yager, R. R.、Filev, D. P.(1993)。SLIDE: A simple adaptive defuzzification method。IEEE Transactions on Fuzzy Systems,1(1),69-78。  new window
14.Subashini, S.、Kavitha, V.(2011)。A survey on security issues in service delivery models of cloud computing。Journal of Network and Computer Applications,34(1),1-11。  new window
15.Van Laarhoven, P. J. M.、Pedrycz, W.(1983)。A Fuzzy Extension of Saaty's Priority Theory。Fuzzy Sets and Systems,11(1-3),229-241。  new window
16.Zadeh, Lotfi Asker(1965)。Fuzzy sets。Information and Control,8(3),338-353。  new window
17.Saaty, Thomas L.(1990)。How to make a decision: the analytic hierarchy process。European Journal of Operational Research,48(1),9-26。  new window
18.Chapman, R. J.(2001)。The controlling influences on effective risk identification and assessment for construction design management。International Journal of Project Management,19(3),147-160。  new window
會議論文
1.劉家驊、洪士凱(2010)。雲端運算資料安全防護機制之研究。2010電腦視覺、影像處理與資訊技術研討會,清雲科技大學 (會議日期: 2010/6/9)。桃園。  延伸查詢new window
圖書
1.管孟忠(2011)。ISO 10006 專案品質管理系統的發展。開南大學專案管理研究所。  延伸查詢new window
2.Project Management Institute(2008)。A Guide to The Project Management Body of Knowledge, Chapter 8 project risk management。Fourth Edition, PA:Project Management Institute。  new window
3.Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。  new window
其他
1.國際商業機器股份有限公司(2010)。IBM觀點:安全與雲端運算,https://www14.software.ibm.com/webapp/iwm/web/signup.do?source=swg-TW_DP_SW&S_PKG=wp_securitycloudcomputing, 2012/02/17。  new window
2.Cloud Security Alliance(2010)。Guidance for identity and access management V2.1, Cloud Security Alliance, 2010,https://cloudsecurityalliance.org/guidance/csaguide-dom-12.pdf, 2012/02/17。  new window
3.Cloud Security Alliance(2010)。Top Threats to Cloud Computing,https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, 2012/02/17。  new window
4.European Network and Information Security Agency(2010)。Cloud computing: benefits, risks and recommendations for information security,http://www.enisa.europa.eu/act/rm/files/eliverables/cloud-computing-risk-assessment, 2012/02/17。  new window
5.IBM(2012)。Cloud Security Guidance IBM Recommendations for The Implementation of Cloud Security,http://www.redbooks.ibm.com/redapers/pdfs/redp4614.pdf, 2012/02/17。  new window
6.International Organization for Standardization(2005)。Information Technology-Security Techniques Information Security Management Systems-Requirement (ISO/IEC 27001).。  new window
7.彭秀琴,張念慈(2010)。雲端運算下資訊安全之探討,http://www.cepd.gov.tw/dn.aspx?uid=9857, 2012/02/17。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE