• 沒有找到結果。

Twhhcs A Study of Hierarchical Structure of Information Security Valuation Criteria

N/A
N/A
Protected

Academic year: 2021

Share "Twhhcs A Study of Hierarchical Structure of Information Security Valuation Criteria"

Copied!
23
0
0

加載中.... (立即查看全文)

全文

Loading

數據

表 3  KMO and Bartlett's Test  Kaiser-Meyer-Olkin  Measure of Sampling  Adequacy.      0.947  Bartlett's Test of  Sphericity  Approx
表 4  整體解釋的變異量─未轉軸前  因素構面  編號  特徵值  (Eigenvalue)  解釋變異量 (%)  累積變異量 (%)  1  37.530  56.863  56.863  2  3.235  4.901  61.765  3  2.017  3.056  64.821  4  1.625  2.462  67.284  5  1.551  2.351  69.634  6  1.420  2.151  71.786  7  1.171  1.774  73.560  8  1.079
表 6  影響組織資訊安全關鍵因素之因素負荷量表  因素構面  解釋變異量%  (累積變異量%) Cronbach’s α (特徵值)  影響資訊安全因素  因  素 負荷量  A354  應用軟體 變更後,立即更新系統文件,兩者保持一致  .730  A353  系統文件之管理、維護及保護  .703  A356  將資訊安全列為應用軟體變更管制程序的一部份  .630  A349  存取控制各項紀錄的建立與保存  .609  A341  制定存取控制政策並符合法令規定  .604  A355  應用軟體
表 10  資訊安全評估之構面與準則整併表  構面  準則  整併之變數  1.1 依據組織目標、策略、資訊政策及業務需要等 制定安全政策,並予文件化  A11 制定資訊安全政策並予文件化  A12 依據組織目標與策略、資訊政策及業務特性等因素制定 資訊安全政策  A341 制定存取控制政策並符合法令規定  1.2 資訊安全政策之定期檢討修正  A13 資訊安全政策之定期檢討修正  1.3 設置資訊安全組織(人員)及資訊安全權責劃 分  A14 設置資訊安全組織或指派資訊安全人員  A15 資訊安全權責劃分

參考文獻

相關文件

The above information is for discussion and reference only and should not be treated as investment

Teacher / HR Data Payroll School email system Exam papers Exam Grades /.

Classifying sensitive data (personal data, mailbox, exam papers etc.) Managing file storage, backup and cloud services, IT Assets (keys) Security in IT Procurement and

The roles of school management and technical support staff on implementing information and network security measures... Security

Centre for Learning Sciences and Technologies (CLST) The Chinese University of Hong Kong..

 Service Level Agreement – ensure at least 99.7% availability of the WiFi service, support four-hour response time and four-hour service recovery with active monitoring,

Certified Information Systems Security Professional (CISSP). Certified Information Systems Security

Besides, we also classify the existing RFID protection mechanisms to solve the different personal privacy threats in our security threat model.. The flowchart of security threat