:::

詳目顯示

回上一頁
題名:美國關鍵基礎設施防護法案與資訊安全管理技術控制標準化
書刊名:國防雜誌
作者:樊國楨韓宜蓁
作者(外文):Farn, Kwo-jeanHan, I-chen
出版日期:2015
卷期:30:4
頁次:頁97-122
主題關鍵詞:關鍵資訊基礎設施防護資訊分享個人資料保護法法規化標準化Critical information infrastructure protectionInformation sharingPersonal data protectionRegulationStandardization
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:8
  • 點閱點閱:3
關鍵基礎設施是國家為維持民生、經濟與政府運作而提供之人民日常生活的基 本功能及服務;基礎設施的運轉中斷,將對公共服務、民眾生活以及國家安全導致危 害。2013年3月韓國遭受摧毀磁碟開機主引導記錄(Master Boot Record, MBR)之攻擊,致 使銀行金融網、廣播電視網及保險公司,共超過48,000部伺服機、電腦以及提款機無法 啟動的資訊安全事故,留下「初戰即是終戰,首戰就是決戰」之關鍵資訊基礎設施防 護(Critical Information Infrastructure Protection, CIIP)網路攻防情境的印記。 鑑於關鍵基礎設施網路安全之重要性,CIIP的政策、標準與法規,已成為先進國家 長策大政的議題,我國亦研議「關鍵基礎設施防護法案」中;參卓美國自1998年第63 號總統決策令(PDD-63),至2013年歐巴馬總統之第21號總統政策令(PPD-21)的CIIP之標 準化與法制化的整備歷程,本文綜整美國CIIP之演進及其關於資訊分享、個人資料保護 框架與國際標準組織之標準化進程,再對於我國之情境加以探討,並提出本文之觀察 及建議。
Critical infrastructure is the basic functions and services provided by country for people's daily life so that people's livelihood, economy and government operations can be maintained. These infrastructures such as communications, finance, electricity, water, and medical services are indispensable. If the operations of these infrastructures are disrupted, it will cause damage to public services, people's life, and national security. The attack on Master Boot Record (MBR) on March 20, 2013 in Korea resulted in the breach of information security which caused the failure of a total of over 48,000 servo machines, computers and cash machines of financial networks and paralyzation of three broadcast networks. This cyber incident has raised the question of“the initial war is the final war; the first battle is the decisive battle."The issues of attack and defense of networks and Critical Information Infrastructure Protection (CIIP), therefore, have been seriously addressed and discussed. In view of the importance of cybersecurity for critical infrastructure, the policy, standards, and regulations of CIIP have become major political issues in advanced countries. Likewise, in Taiwan, the Critical Infrastructure Protection Act has also been researched. The whole preparation course of standardization and legalization of CIIP from PDD-63 on May 22, 1998 to President Barack Obama's PPD-21 on February 12, 2013 in the United States is a good reference. Based on this reference, the entire evolution of American CIIP, and the processes of its ISO standardization on comprehensive framework of information sharing and protection of personal data was complied. Based on Taiwan's national situation, this study conducts investigation and observation and proposes policy recommendations.
期刊論文
1.樊國禎、黃健誠、林惠芳(20120600)。數位社會資訊安全生態系統(Ecosystem)標準化簡介。標準與檢驗,162,42-58。  延伸查詢new window
2.樊國楨、林惠芳、黃健誠、林樹國(20121100)。論美國資訊安全管理政策--從「數位空間國際策略」中之供應鏈風險管理標準化進程談起。前瞻科技與管理,2(2),15-35。new window  延伸查詢new window
3.樊國楨、黃健誠、朱潮昌(20130100)。資訊安全管理與脆弱性評分系統初探:根基於安全內容自動化協定。電腦稽核,27,79-101。new window  延伸查詢new window
4.樊國楨、韓宜蓁、黃健誠(20140100)。資訊安全管理系統要求事項初探:根基於ISO/IEC 27001:2013(E)新版之脈胳及其變更。標準與檢驗,181,62-90。  延伸查詢new window
5.樊國楨、黃健誠、林樹國(20150500)。《個人資料保護法施行細則》第17條實作初論:根基於ISO/IEC 29100:2011-12-15標準系列。前瞻科技與管理,5(1),43-83。new window  延伸查詢new window
6.樊國楨、林惠芳、黃健誠(20111000)。管理系統要求事項標準化初探--資訊安全管理系統標準化之歷程。標準與檢驗,154,51-63。  延伸查詢new window
7.Rutkowski, Anthony(2010)。CYBEX--The Cybersecurity Information Exchange Framework (X.1500)。ACM SIGCOMM Computer Communication Review,40(5),59-64。  new window
8.程法彰、洪嫈媛(20131100)。美國在資訊時代中對關鍵基礎設施保護架構與資訊分享議題初探及我國的借鏡。前瞻科技與管理,3(2),119-137。new window  延伸查詢new window
9.左曉棟(2013)。立法困境下的戰略新部署--美國關鍵基礎設施保護行政令評述。中國信息安全,39,74-75。  延伸查詢new window
10.左曉棟(20121000)。美〈網絡安全法案〉分析與思考。資訊安全通訊,18(4),24-42。  延伸查詢new window
11.樊國楨、黃健誠、林樹國(20130500)。完備我國資訊安全管理法規初探。前瞻科技與管理,3(1),97-147。new window  延伸查詢new window
12.Herrmann, Debra、Keith, Stephen(2011)。Application of Common Criteria to Telecomm Services: A Case Study。COMPUTER SECURITY JOURNAL,17(2),21-28。  new window
13.Shakarian, Paulo(20110415)。Stuxnet: Cyberwar Revolution in Military affairs。Small Wars Journal,1-10。  new window
會議論文
1.樊國楨、韓宜蓁(2014)。雲端運算資訊安全管理標準化初探:根基於國際標準組織之標準化的進程。雲端技術與安全管理研討會。桃園:中華安全科技與管理學會。81-124。  延伸查詢new window
2.林豐裕(2014)。行動App加密通訊軟體對執法機關之衝擊與因應。「雲端技術與安全管理」研討會,(會議日期: 2014/6/16-17)。桃園:中央大學。57-91。  延伸查詢new window
3.Streufert, John(2012)。Continuous Monitoring: Diagnostics & Mitigation (Presentation)。The 8th Annual IT Security Automation Conference,(會議日期: Oct. 3-5)。  new window
4.Mueller, Milton、Kuehn, Andreas(2013)。Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change。The 12th Workshop on the Economics of Information Security,(會議日期: June 11-12)。Washington, D. C.:Georgetown University。11-12。  new window
研究報告
1.ITU(2011)。ITU-T Focus Group on Cloud Computing。  new window
2.Marsh, Robert T.(19971013)。Critical Foundations: Protecting America's Infrastructure。  new window
3.Obama, Barack(20090329)。Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure。The White House。  new window
4.Tehan, Rita(20140403)。Cybersecurity: Authoritative Reports and Resource, by Topic。CRS。  new window
學位論文
1.La Bash, Miranda、Landis, Christopher(20130802)。Legal, Policy, and Organizational Impediments to the Protection Critical Infrastructure from Cyber Threats(碩士論文)。Carnegie Mellon University。  new window
圖書
1.Kundra, Vivek(2010)。25 Point Implementation Plan to Reform Federal Information Technology Management。The White House。  new window
2.Schmitt, Michael N.(2013)。Tallinn Manual on the International Law Applicable to Cyber Warfare。Cambridge University Press。  new window
3.U.S. Department of Defense(20110714)。Department of Defense Strategy for Operating in Cyberspace。U.S. Department of Defense。  new window
4.von Knop, Jan、Salnikov, Alexey A.、Yaschenko, Valeriy V.(2007)。A Process for Developing a Common Vocabulary in the Information Security Area。IOS Press。  new window
5.Skanata, Dejan、Byrd, Daniel M.(2007)。Computational Models of Risks to Infrastructure。IOS Press。  new window
6.Bush, George W.(2003)。National Strategy to Secure Cyberspace (Report)。The White House。  new window
7.Clinton, William J.、Clarke, R. A.(20000107)。Defending America's Cyberspace: National Plan for Information Systems Protection Version 1.0; An Invitation to a Dialogue。The White House。  new window
8.Information Assurance Directorate(20050201)。Consistency Instruction Manual for development of U.S. Government Protection Profiles for use in Medium Robustness Environments。  new window
9.Obama, Barack(2011)。National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy。The White House。  new window
10.Obama, Barack(20110516)。International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World。The White House。  new window
11.NIST(20140212)。Framework for Improving Critical Infrastructure Cybersecurity。  new window
單篇論文
1.Hardy, Mark G.(2012)。Beyond Continuous Monitoring: Threat Modeling for Real-time Response: A SANS Whitepaper,Symantec Corporation。,http://www.symantec.com/content/en/us/enterprise/white_papers/b_Symantec_Continuous_Monitoring.pdf。  new window
2.Sherstobitoff, Ryan,Liba, Itai,Walter, James(20130320)。Dissecting Operation Troy Cyberespionage in South Korea,McAfee。,https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/dissecting-operation-troy.pdf。  new window
3.The White House(20110512)。FACT SHEET: Cybersecurity Legislative Proposal。  new window
4.U.S. Department of Defense, Chief Information Officer, International Cybersecurity Program(2013)。Cybersecurity Reference & Resource Guide,https://www.hsdl.org/?view&did=735671。  new window
5.U.S. Department of Homeland Security(2008)。Privacy Policy Guidance Memorandum, Memorandum Number: Jan., 2008,The Privacy Office, DHS。  new window
6.U.S. Office of Management and Budget(20140501)。Annual Report to Congress: Federal Information Security Management Act,OMB。  new window
7.U.S. Office of Management and Budget(20100706)。Clarifying Cybersecurity Responsibilities, and Activities of the Executive Office of the President and the DHS,OMB。(M-10-28)。  new window
8.U.S. Office of Management and Budget(20131118)。Enhancing the Security of Fedral Information and Information Systems,OMB。(M-14-03)。  new window
9.U.S. Office of Management and Budget(20100421)。FY 2010 Reporting Instructions for the Federal Information Security Management Act and Privacy Management,OMB。(M-10-15)。  new window
10.U.S. Office of Management and Budget(20071120)。Implementation of Trusted Internet Connections (TIC),OMB。(M-08-05)。  new window
11.U.S. Office of Management and Budget(20111208)。Security Authorization of Information Systems in Cloud Computing Environments,OMB。  new window
其他
1.行政院科技顧問組(20111231)。關鍵資訊基礎建設保護政策指引,http://land.tainan.gov.tw/FileDownLoad/FileUploadList/744.pdf。  延伸查詢new window
2.經濟部標準檢驗局(2003)。不同型式的執行檢驗機構運作之一般準則(CNS 14725)。,臺北:經濟部標準檢驗局。  延伸查詢new window
3.中國國家標準化管理委員會(2014)。信息安全技術工業控制系統現場測控設備安全功能要求(微求意見稿),北京:中國國家標準委員會。  延伸查詢new window
4.行政院(20150325)。「網路智慧新臺灣政策白皮書」基礎環境構面第二次實體會議會議紀錄。  延伸查詢new window
5.Bush, George W.(2010)。National Security Presidential Directive (NSPD)-54/HSPD-23: The Comprehensive National Cybersecurity Initiative (CNCI),The White House。  new window
6.Bush, George W.(20131217)。Homeland Security Presidential Directive/HSDD-7: Critical Infrastructure Identification, Prioritization, and Protection,The White House。  new window
7.Clinton, William J.(19960715)。Executive Order/EO 13010: Critical Infrastructure Protection,http://fas.org/irp/offdocs/eo13010.htm。  new window
8.Clinton, William J.(19980522)。The Clinton Administration's Policy on Critical Infrastructure Protection (White Paper) Presidential Decision Directive/PDD-63,The White House。  new window
9.Dressel, Andrew M.(20120330)。NERC Standards Report, Status and Timetable for Addressing Regulatory Directives,http://www.nerc.com/files/2012_Directives_Report_complete.pdf。  new window
10.GSA(20111001)。FedRAMP Third Party Assessment Organization (3PAO) Program Description。  new window
11.GSA(20120207)。FedRAMP Concept of Operations (CONOPS)。  new window
12.DoD,DHS,GSA(20120228)。FedRAMP Joint Authorization Board Charter。  new window
13.Obama, Barack(20130212)。Presidential Policy/PPD-21: Critical Infrastructure Security and Resilience,The White House。  new window
14.Privacy Impact Assessment Update for the Joint Cybersecurity Services Program (JCSP), Defense Industrial Base (DIB)-Enhanced Cybersecurity Services (DECS),http://www.dhs.gov/xlibrary/assets/privacy/privacy-pia-update-nppd-jcps.pdf。  new window
15.U.S. General Services Administration(2014)。Continuous Diagnostics and Mitigation (CDM) Program Tools and Continuous Monitoring as a Service (CMaasS) Blanket Purchase Agreements (BPAs),http://www.gsa.gov/cdm。  new window
16.Cyberspace Policy Review,http://www.whitehouse.gov/cyberreview/documents。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
QR Code
QRCODE