:::

詳目顯示

回上一頁
題名:網路資訊戰所扮演角色及因應策略之研究
書刊名:國防雜誌
作者:簡華慶
作者(外文):Jian, Hua-ching
出版日期:2012
卷期:27:1
頁次:頁122-138
主題關鍵詞:資通安全資訊防護網路攻防網路作戰Information securityInformation protectionCyber attack and defenseCyber warfare
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:0
  • 點閱點閱:4
提  要 一、資訊戰勢必成為未來戰爭最先短兵相接的地方,也是勝敗關鍵的重要因素。 二、隨著科技進步,網路攻擊的範圍會越來越大,破壞性會越來越強,資料竊取已無 法滿足網路侵入者的需求。 三、資訊作戰若僅藉年度演訓或以高司作業方式模擬,欠缺由真正實體網路環境所得 之教訓與經驗,將無法因應真實網路攻防事件。 四、資訊管控機制及流程只是治標,人還是最終及最佳防線,唯有讓保密的習慣成為 一種深耕文化,才可將資安事件降至最低。
Abstract The type of warfare has been changed in decades. The first strike by computer is not beyond possibility in the future. The cyber-war will be one of the most important key factors to affect the result of a war. The same knife cuts bread and fingers. Technology brings a new method to improve the ability of the network and makes the transmission of computer data be faster but has gravitated into a cyber attack. Although the procedures of information security protection have been set up in the military, those actions are not enough to catch up the change of invention of virus. Attending the relative computer emergency readiness team organizations and technical security conferences in the world is a quick and effective means to advance our understanding of information security learning. The responsibility of information security is not only for information persons also for military staff. All the mechanism of information managements can solve a temporary solution to a problem. The user's proper behavior in thinking and doing is the best way to reduce the chance of divulgence. The culture of obeying rules should be formed in everybody's mind.
期刊論文
1.Fulghum, David A.(20071008)。Israel used electronic attack in air strike against Syrian mystery target。Aviation Week & Space Technology。  new window
圖書
1.The Cabinet Office, UK(2010)。A Strong Britain in an Age of Uncertainty: The National Security Strategy。  new window
2.中華人民共和國國務院(2009)。2008年中國的國防。  延伸查詢new window
3.U.S.-China Economic and Security Review Commission(2010)。2010 Report to Congress of the U.S.-China Economic and Security Review Commission。  new window
其他
1.中華民國總統府。公佈中華民國100年度中央政府總預算,http://www.president.gov.tw/Default.aspx?tabid=84&lctl=view&itemid=8571&ctid=96。  延伸查詢new window
2.SOPHOS。Security Threat Report: Mid-year 2010,http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-midyear-2010-wpna.pdf。  new window
3.Spencer, Richard(20101004)。Stuxnet virus attack on Iranian nuclear programme: the first strike by computer?,http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8040656/Stuxnet-virus-attack-on-Iranian-nuclear-programme-the-first-strike-by-computer.html。  new window
4.Kessler, Glenn(20080828)。Georgia War Shows 'Weak' Russia, U.S. Official Says,http://www.washingtonpost.com/wp-dyn/content/article/2008/08/27/AR2008082703192.html。  new window
5.Traynor, Ian(20070517)。Russia accused of unleashing cyberwar to disable Estonia,http://www.guardian.co.uk/world/2007/may/17/topstories3.russia。  new window
6.游玉琦(20101008)。亞太電信引進華為基地台現況,http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=10&id=0000202783_0L86IP1D9Y88VD2C18789。  延伸查詢new window
7.Pomfret, John(20101008)。History of telecom company illustrates lack of strategic trust between U.S., China,http://www.washingtonpost.com/wp-dyn/content/article/2010/10/07/AR2010100707210.html。  new window
8.楊國文,李克強(20071110)。中國「駭」群之馬 攻臺接二連三,http://www.libertytimes.com.tw/2007/new/nov/10/today-fo3-2.htm。  延伸查詢new window
9.BBC NEWS(20110217)。UK cyber crime costs £27bn a year-government report,http://www.bbc.co.uk/news/uk-politics-12492309。  new window
10.North Atlantic Treaty Organization。Defending against cyber attacks,http://www.nato.int/cps/en/natolive/topics_49193.htm?selectedLocale=en。  new window
11.Markoff, John,Barboza, David(20100219)。2 China Schools Said to Be Tied to Online Attacks,http://www.nytimes.com/2010/02/19/technology/19china.html.。  new window
12.Marquardt, Alexander(20101012)。Russia's High-Tech Military Turns to Inflatable Weapons,http://abcnews.go.com/Technology/International/russias-inflatable-military/story?id=11856527。  new window
13.彭清仁(20101027)。諾貝爾和平獎網站駭客入侵 疑似來自交大,http://www.pac.nctu.edu.tw/Report/report_more.php?id=20260。  延伸查詢new window
14.劉曉霞(20100819)。政院通過明年預算案 100年政府舉債4,290億元較去年減少606億元,http://news.cts.com.tw/cnyes/money/201008/201008190543607.html。  延伸查詢new window
15.National Priorities Project。Costofwar,http://costofwar.com/。  new window
16.黃一翔(20101104)。馬總統:建構小而強、小而精、小而巧國軍 防衛臺灣安定,http://news.gpwb.gov.tw/newsgpwb_2009/news.php?css=2&rtype=1&nid=155193。  延伸查詢new window
17.洪哲政(20101115)。國安局官網1個月遭攻擊50萬次,http://udn.com/NEWS/NATIONAL/NAT5/5974945.shtml。  延伸查詢new window
18.沈子涵(20101117)。臺灣行政部門遭駭客狂轟濫炸 日均被攻擊逾2萬起,http://www.cdnews.biz/cdnews_site/docDetail.jsp?coluid=115&docid=101353386。  延伸查詢new window
19.Sabbagh, Dan(20101205)。WikiLeaks: Google attacks ordered by Li Changchun,http://www.guardian.co.uk/world/the-us-embassy-cables。  new window
20.Zetter, Kim,Poulsen, Kevin(20100726)。Pentagon Says Bradley Manning a Possible Suspect in Afghan Leak,http://www.wired.com/threatlevel/author/kim-zetter-and-kevin-poulsen/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top