参考文献
|
-
樊國楨,季祥,韓宜蓁(2015)。資訊安全管理系統稽核初論:根基於資安健診與標準化。Communications of the CCISA,21(1),33-56。
連結:
-
樊國楨,林惠芳,黃健誠,林樹國(2012)。論美國資訊安全管理政策-從「數位空間國際策略 」中之供應鏈風險管理標準化進程談起。前瞻科技與管理,2(2),15-34。
連結:
-
樊國楨,黃健誠,朱潮昌(2013)。資訊安全管理與脆弱性評分系統初探。電腦稽核,27,79-101。
連結:
-
樊國楨,黃健誠,林樹國(2013)。完備我國資訊安全法規初論。前瞻科技與管理,3(1),97-147。
連結:
-
樊國楨,韓宜蓁,季祥(2014)。黑暗首爾(Dark Seoul)資訊安全事故(2013- 03-20)及其防禦方法初論。Communications of the CCISA,20(2),24-36。
連結:
-
(2012).NIST Interagency Report (IR) 7756 (2nd Draft). CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model. January 2012..
-
Andresen, Leslie(2011).Trusted Computing Based Insider Threat Protection.2nd Annual NSA Trusted Computing Conference & Exposition
-
Booth, H.,Halbardier, A.(2011).NIST Interagency ReportNIST Interagency Report,未出版
-
Chandramouli, Ramaswamy(2017).NIST Interagency ReportNIST Interagency Report,未出版
-
Cooper, David,Polk, William,Regenscheid, Andrew,Souppaya, Murugiah(2014).Cooper, David, William Polk, Andrew Regenscheid, & Murugiah Souppaya (2014). BIOS Protection Guidelines. NIST Special Publication 800- 147, 2011/ 04.
-
Coyne, E. J.,Weil, T.R.(2013).ABAC and RBAC: Scalable, Flexible, and Auditable Access Management.IEEE IT Professional
-
DoD(2011).ICSOA Security Reference Architecture.IA newsletter,14(3),16.
-
Enders, R., & H. Schwarz (2013) . Network Endpoints and Attribute Based Access Controls. May 2013 Whitepaper and Presentation Submissions, ICS-CERT (Industrial Control Systems Cyber Emergency Response Team), https://www.cisa.gov/uscert/ics/ (accessed October 19, 2013).
-
Hu, Vincent C.,Ferraiolo, David,Kuhn, Rick,Schnitzer, Adam,Sandlin, Kenneth,Miller, Robert,Scarfone, Karen(2014).NIST Special PublicationNIST Special Publication,未出版
-
IAF, Inc.(2022).IAF (International Accreditation Forum, Inc.) (2022) Knowledge Requirements for Accreditation Body Personnel for Information Security Management Systems (ISO/IEC 27001) Issue 2, Version 2 (IAF MD 13: 2022), 2022- 09- 19..
-
IAS (International Accreditation Service) INC(2013).IAS (International Accreditation Service) INC (2013). Accreditation Criteria for Management System Certification Bodies. IAS/MS/ 001, July 2, 2013..
-
Irvine , C. E.,Levin, T. E.(2004).A Doctoral Program with Specialization in Information Security.Information Security Management, Education and Privacy
-
Irvine, C.(Ed.),Armstrong, H.(Ed.)(2003).Security Education and Critical Infrastructures.Kluwer Academic Publishers.
-
ISO(2008).ISO (2008). Corporate Governance of information technology-a standard for corporate governance of information technology. ISO/IEC 38500: 2008(E)..
-
ISO(2013).ISO (2013c). Information technology – Security techniques – Governance of information security. ISO/IEC 27014: 2013(E)..
-
ISO(2013).ISO (2013a). Information technology-Security techniques -Code of practice for information security control. ISO/IEC 27002: 2013- 10- 01..
-
ISO(2013).ISO (2013b). Information technology-Security techniques – Information security management systems – Requirements. ISO/IEC 27001: 2013(E)..
-
ISO,IEC(2022).ISO/IEC 18045 (2022- 08) Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation..
-
ISO,IEC(2022).ISO/IEC 27002 (2022- 03). Information security, cybersecurity and privacy protection–Information security controls..
-
ISO,IEC(2016).ISO/IEC JEC 1/SC 27 (2016). Information technology – Security techniques-Information security for supplier relationships - Part 4: Guidelines for security of cloud services. ISO/IEC 27036-4: 2016- 10- 01..
-
ISO,IEC(2022).ISO/IEC 15408 (2022- 08) Information security, cybersecurity and privacy protection(all parts).I.
-
ISO,IEC(2022).ISO/IEC 27001 (2022- 10). Information security, cybersecurity and privacy protection-Information security management systems-Requirements..
-
Kuhn, D. R.,Coyne, E.J.,Weil, T.R.(2016).Adding Attributes to Role Based Access Control.IEEE Computer,79-81.
-
Michael, Willett (2013). Consumerization of Trusted Computing. https://www.snia.org/sites/default/education/tutorials/2013/fall/Security/MichaelWillett_Consumerization_of_Trusted_Computing.pdf(2022 年 11 月 1 日檢索 ).
-
Nguyen, T.D.,Irvine, C.E.(2006).Utilizing the Common Criteria for Advanced Student Research Projects.Proceedings of the IFIP TC- 11 21st International Security Conference
-
OMB, EXECUTIVE OFFICE OF THE PRESIDENT(2022).OMB (OFFICE OF MANAGEMENT AND BUDGET, EXECUTIVE OFFICE OF THE PRESIDENT) (2022- 01- 26). Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (M- 22- 09, January 26, 2022). OFFICE OF MANAGEMENT AND BUDGET, EXECUTIVE OFFICE OF THE PRESIDENT..
-
Regenscheid, A.,Scarfone, K.(2011).Regenscheid, A. and K. Scarfone (2011). BIOS Integrity Measurement Guidelines aft. Special Publication 800- 155 (Draft), 2011/ 12..
-
Sherstobitoff, R.,Liba, I.,Walter, J.(2013).,McAfee.
-
Souppaya, Murugiah,Morello, John,Scarfone, Karen(2017).NIST Special PublicationNIST Special Publication,未出版
-
Sultan, S.,Ahmad, I.,Dimitriou, T.(2019).Container Security: Issues, Challenges, and the Road Ahead.IEEE Access,7,52976-52996.
-
Unal, D.,Caglayan, M. U.(2013).A formal role-based access control model for security policies in multi-domain mobile networks.Computer Networks,57(1),300-350.
-
Vrancken, Joren(2020).Computing Science, Radboud University.
-
Walker, A.J.(2011).Walker, A.J. (2011). Evaluating the ISO TMB Management System Common Text proposal in terms of selection of candidate management system standards. HRD- 095-PRD-02.Walker-Paper.doc Issue 3, 29 August 2011, SPI Tab.
-
Willett, Michael(2013).Dr. Michael Willett (2013). Consumerization of Trusted Computing. Storage Networking Industry Association..
-
中國信息通信研究院雲計算與大數據研究所(2021)。,未出版
-
中華民國資訊軟體協會(2012)。,未出版
-
仉桂美,劉德勳,包宗和(2021)。仉桂美、劉德勳與包宗和 (2021)。109教調 0004(監察院調查報告),110/06/04。
-
行政院(2013)。行政院 (2013)。院臺護字第 1020157911號函,2013 年 12 月 15 日。
-
行政院 (2021)。資通安全管理法及子法彙編,2021 年 9 月。
-
吳世忠,劉暉,郭濤,易錦(2013).信息安全漏洞分析基礎.科學出版社.
-
季祥,樊國楨,韓宜蓁(2015)。進階持續性威脅之防護與認知初論:根基於黑暗首爾資訊安全事故及其防禦方法。前瞻科技與管理,5(2),95-122。
-
財團法人全國認證基金會(2022)。財團法人全國認證基金會 (2022)。《管理系統驗證機構資通安全管理法驗證方案特定要求》2022/04。
-
財團法人全國認證基金會 (2020)《資訊安全管理系統驗證機構認證規範(ISO/IEC 27006: 2015 AMD 1: 2020)》2020/ 10。
-
曾懿晴、李明賢(2014)。「政院踢爆,全國APP設計不良;eTag遭駭,攏係假。」。中國時報,A 1 要聞,2014 年 01月 16 日。
-
華為技術有限公司(2020).華為雲安全白皮書.中國:深圳:
-
經濟部標準檢驗局 (2007)。資訊技術-安全技術-資訊安全管理系統,CNS(ISO/IEC 27001: 2005(E)) 27001: 2007- 10- 24。
-
經濟部標準檢驗局 (2012)。風險管理-原則與指導綱要:CNS (ISO 3100: 2009(E)) 3100。2012年 08月 16日。
-
樊國楨,林惠芳,黃健誠(2011)。管理系統要求事項標準化初探:根基於資訊安全管理系統標準化歷程。標準與檢驗,154,51-63。
-
樊國楨,黃健誠(2013)。下一世代網路(Next Generation Network, NGN)安全標準初探之三:可信賴網路接取(Trusted Network Connect, TNC)。網路通訊國家型科技計畫簡訊,54,38-47。
-
樊國楨,謝麗珠,黃健誠,廖菊芳,王演芳,林國水,翁敏鈺(2010)。資訊安全治理(ISG)與資訊安全管理系統(ISMS)實作初探:根基於 ISG 框架之策略校準。政府機關資訊通報,274,16-20。
-
樊國楨,謝麗珠,黃健誠,廖菊芳,王演芳,林國水,翁敏鈺(2010)。資訊安全治理(ISG)與資訊安全管理系統(ISMS)實作初探:根基於 ISG 框架之策略校準。政府機關資訊通報,275,13-19。
-
樊國楨,謝麗珠,黃健誠,廖菊芳,王演芳,林國水,翁敏鈺(2010)。資訊安全治理(ISG)與資訊安全管理系統(ISMS)實作初探:根基於 ISG 框架之策略校準。政府機關資訊通報,273,17-20。
-
樊國楨,韓宜蓁,黃健誠(2014)。資訊安全管理系統要求事項初探:根基於 ISO/IEC 27001: 2013(E) 新版之脈終及其變更。標準與檢驗,181,62-90。
|