研究生: |
蔡璧舟 PI-CHOU TSAI |
---|---|
論文名稱: |
網路安全防火牆公司之產品規畫與佈局-以F公司為例 A Case Study of Product Planning and Deployment for Networking Security Firewall Company |
指導教授: |
吳宗成
Tzong-Chen Wu |
口試委員: |
羅乃維
Nai-Wei Lo 查士朝 Shi-Cho Cha |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2019 |
畢業學年度: | 107 |
語文別: | 中文 |
論文頁數: | 56 |
中文關鍵詞: | 網路安全 、防火牆 、雲端運算 、物聯網 、端點防護 |
外文關鍵詞: | Networking Security, Firewal, Cloud Computing, Internet of Things, End Point Protection |
相關次數: | 點閱:328 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著電腦運用的普及與網際網路的蓬勃發展,網路扮演著重要連結的角色,越來越多的應用都跑在網路上。隨Web 2.0、3.0、4.0世代交替的不斷進行,現今無論是攸關企業關鍵應用的SAP、Oracle、Salesforce.com,乃至偏向個人端應用的eBay、Yahoo!、Youtube、Skype、BitTorrent、Facebook、Twitter等一干程式,不管小的大的、重要不重要、合法非法,全都走Port 80,倘若依此實施安全管控,是沒有太多意義的。傳統防火牆,顯然已無法跟上Web 2.0腳步。隨著互聯網技術的大幅提升,也開啟了行動化、雲端化、物聯網時代的來臨。當這些新的應用被大量採用,造成更複雜的網路安全議題,而越來越多網路安全設備的整合也已經是管理人員最頭痛的問題之一。網路安全防火牆公司的產品發展與佈局已經面臨新的挑戰。
本研究探討現今防火牆所面臨的挑戰與未來的趨勢,並深入了解雲端與物聯的大量使用所帶來前所未有的複雜威脅與管理的難題。透過文獻的蒐集了解防火牆市場的現況與趨勢,最終選定全球網路安全防火牆公司做個案研究與訪問,期能瞭解網路安全防火牆公司如何進行產品規劃與佈局,藉由此一研究期望能讓本土網路安全防火牆公司當參考,找到未來發展的方向。
With the popularity of computer usage and the rapid development of the Internet, internet plays a more significant role and applications are increasingly running on it. With the alternation of web 2.0, 3.0, and 4.0 generations, applications which are essential for corporate, such as SAP, Oracle, Salesforce.com and even personal applications like eBay, Yahoo!, YouTube, Skype, BitTorrent, Facebook, Twitter and so on, regardless of whether it is small, important, or illegal and all are running on port 80. It does not make sense if we implement the security policy control only on port 80. Traditional firewalls are clearly unable to keep up with web2.0. With the advancement of technology, the speed of the Internet has increased dramatically, and the emergence of cloudization and mobilization of application, IoT era has also begun. When these new applications are adopted in a large number, the complexity of network security is much higher and the integration of various network security appliances has become one of the most headaches for security officers.
This research has explored the challenges and the protection deficiencies faced by today's firewalls and provides insight into the complex threats and management challenges that have never been seen before the massive use of the cloudization and IoT. With the collection of literature to understand the current situation and trend of the network firewall market, and finally select the global network security firewall company to do case studies and visits, to understand how the global network security firewall company to conduct product planning and layout, through this research to let our network security-related research and development companies develop a new direction for network security industry.
中文文獻
邱憶惠(1999),「個案研究法:質化取向」。國立高雄師範大學教育學系教育研究所碩士論文。
江梓安(2007),考量多目標與資源限制下之產品研發策略與績效評估方法論,國立清華大學碩士論文。
鍾文瑋(2008),產品服務系統之維修服務策略之研究,明新科技大學碩士論文。
楊文斌(2011),研發創新與產品行銷策略管理影響之研究-以T公司產品發展個案為例,國立臺北科技大學碩士論文。
王義智(2009),資訊安全發展趨勢與我國可能商機研究,資策會。
行政院資通安全處(2018),資安產業發展行動計畫,行政院資通安全處。
陳向明(2002),社會科學質的研究,台北:五南。
潘淑滿(2003),質性研究:理論與應用,台北:巨流。
張昌財、黃廷合(2017),科技管理第四版,台北:全華圖書。
葉至誠、葉立誠(2011),硏究方法與論文寫作,台北:商鼎數位。
楊波、周亞寧、紀旻旻(2013),從零開始了解 TCP/IP 基礎架構,台北:佳魁資訊。
Marcus Goncalves(2000),防火牆完全指南(劉良棟,錢盈秀,吳曜呈譯),台北:美商麥格羅‧希爾台灣分公司。
Simson Garfinkeland Gene Spafford(2001),UNIX與INTERNET安全防護系統篇(陳志昌、林逸文、蔣大偉譯),台北:美商歐萊禮台灣分公司。
英文文獻
Yin, R. K. (1984),Case study research: Design and methods, Newbury Park, CA : Sage Publications.
Maccoby, E. and Maccoby, N. (1954),The Interview: A Tool of Social Science, In G. Lindzey (Ed.), Handbook of Social Psychology, Cambridge, Massachusetts: Addison-Wesley.
Minichiello, V., Aroni, R., Timewell, E. and Alexander L.(1995),In-depth Interviewing, Second Edition. South Melbourne: Longman.
Stake, R. E.(1995),The Art of Case Study Research, Thousand Oaks, CA: Sage.
Bellovin, S. M. and Cheswick, W. R. (1994),“Network firewalls” ,IEEE Communications Magazine, Volume 32,Issue 9, pp.50-57.
Noureldien, N.A.,Osman,I.M. (2000),“On firewalls evaluation criteria,” 2000 TENCON Proceedings of Intelligent Systems and Technologies for the New Millennium, Kuala Lumpur, Malaysia, Malaysia.
網路資料
富揚資訊網路安全(2002),「White Paper」,2018/3/12 取自http://www.adcom.com.tw/product/sonicw/firewall_wp.htm
東海大學資訊安全教學網站(2002),「防火牆」,2018/3/28 取自http://dado.thu.edu.tw/research/p2/6/firewall.htm
江淑美、吳伊勻、翁士勛、劉育雯(2000),「教育研究法專題研究報告—個案研究(Case study)」,2018/4/22 取自http://www.ntnu.edu.tw/faculty/t16/89-phd1-aritle/89-phd.htm
iThome(2010),次世代防火牆需要具備的6項功能,2018/4/25 取自https://www.ithome.com.tw/news/95997
Cisco Website(2018),Cybersecurity Report Series,2018/2/1 from https://www.cisco.com/c/en/us/products/security/security-reports.html?dtid=osscdc000283
Check Point Website(2018),2018 Security Report,2018/1/5 from
https://research.checkpoint.com/check-points-2018-security-report/
Palo Alto Website(2019),Cyberthreat Defense Report 2018,2018/2/8 from https://www.paloaltonetworks.com/resources/research/cdr
Symantec Website(2019),2019 Internet Security Threat Report,2018/3/8 from https://www.symantec.com/en/sg/security-center/threat-report