跳到主要內容

臺灣博碩士論文加值系統

(34.204.181.91) 您好!臺灣時間:2023/09/28 08:01
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林淮森
研究生(外文):LIN, HUAI-SEN
論文名稱:網路資料儲存系統於高可用性與安全防護需求下的關鍵影響因素探討
論文名稱(外文):Exploration of Key Influencing Factors for Network Storage Systems under High Availability and Security Protection Requirements
指導教授:林榮禾林榮禾引用關係
指導教授(外文):LIN, RONG-HO
口試委員:林榮禾林益辰莊淳淩
口試委員(外文):LIN, RONG-HOLIN, I-CHENCHUANG, CHUN-LING
口試日期:2023-06-21
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:管理學院工業與科技管理EMBA專班
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2023
畢業學年度:111
語文別:中文
論文頁數:76
中文關鍵詞:網路儲存高可用性資訊安全勒索病毒
外文關鍵詞:Network StorageHigh AvailabilityInformation SecurityRansomware
相關次數:
  • 被引用被引用:0
  • 點閱點閱:4
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,由於Covid-19疫情的影響,晶片供應與關鍵材料均出現了供需失衡與嚴重短缺的情況。此現象在2022年下半年逐漸有所改善,雖然仍然不穩定供貨,但材料供應緊張的情況已從缺料變成少量供應,交貨時間也逐漸恢復。然而,當材料供應穩定且需求得以滿足時,個人生活需求回歸正常,各國的邊境解封並重回實體經濟。企業對數位轉型的需求不斷加深。在2023年,企業在未來的IT投資方面將更加精準評估。除了選擇能夠長期運作的基礎網絡儲存方法並購買更多儲存伺服器外,也考慮將一部分資源放在雲端上。
同時在疫情後開始出現了全球通貨膨脹,經濟衰退等一系列變化和挑戰, 增加彈性、降低總成本和資源最佳化也就成為企業營運議程上為重視的議題。 加上數位化應用和線上業務更是從疫情開始後就得到了快速發展和大量普及,並在許多行業產生了深遠的影響,這推動了數位轉型的加速,讓許多企業將更多資源投入數位創新領域,以提高效率、適應新的消費模式並創造更多機會。因此,將導致企業無論是基礎網路儲存佈建,或是隨處服務的佈署,在未來都還有很多商機做進一步擴展。
本文以調查專訪專業IT經理人的意見, 找出合適的方式讓組織能夠快速且有效率地了解儲存需求,挑選儲存服務方式,並規避資安威脅與資料損失的風險,最終歸納統合出佈署網路資料儲存系統的最重要關鍵影響因素。

In recent years, due to the impact of the Covid-19 pandemic, there has been an imbalance between supply and demand for chips and critical materials. This phenomenon gradually improved in the latter half of 2022. While the supply remains unstable, the situation of material scarcity has shifted from shortages to limited supply, and delivery times have gradually recovered. However, as material supply stabilizes and demand is met, personal lifestyle needs return to normal, and countries are reopening their borders, returning to physical economies. The demand for digital transformation by businesses continues to deepen. In 2023, businesses will assess future IT investments with greater precision. Besides opting for sustainable foundational network storage methods and purchasing more storage servers, they are also considering allocating a portion of resources to the cloud.

Simultaneously, post-pandemic, global factors such as inflation and economic recession have introduced a series of changes and challenges. Increasing flexibility, reducing overall costs, and optimizing resources have become significant priorities on corporate agendas. Moreover, digital applications and online businesses have experienced rapid development and widespread adoption since the onset of the pandemic, profoundly impacting various industries. This has accelerated the process of digital transformation, leading many companies to invest more resources in the realm of digital innovation. This is aimed at enhancing efficiency, adapting to new consumer patterns, and creating more opportunities. Consequently, this will result in numerous opportunities for further expansion, whether in foundational network storage deployment or ubiquitous service deployment, for businesses in the future.

This article conducts surveys and interviews with professional IT managers to identify suitable ways for organizations to rapidly and efficiently comprehend storage requirements, choose storage service methods, and mitigate risks related to cybersecurity threats and data loss. Ultimately, it summarizes the most critical influencing factors for deploying network storage systems.

摘要 i
ABSTRACT ii
誌謝 iv
目 錄 v
表目錄 vii
圖目錄 viii
第一章 緒論 1
1.1 研究背景與動機 1
1.2 儲存資料的巨幅成長 3
1.3 研究目的 4
1.4 研究流程 5
第二章 文獻探討 7
2.1 海量儲存資料的管理難題 7
2.2 維持服務不中斷的高可用架構 10
2.3 災難復原的復原時間目標(RTO)與復原時間點目標(RPO) 11
2.4 安全防護需求下最常見的網路攻擊方式與實際案例 12
2.5 資安管理制度之稽核策略 17
2.6 德爾菲法(Delph Method)的應用 18
2.7 層級分析法的應用 19
2.8 結合德爾菲法及層級分析法的研究文獻 20
第三章 研究方法 24
3.1 研究架構 24
3.2 問卷的設計 25
3.3 德爾菲法(Delphi method) 26
3.3.1 德爾菲法的工作步驟 27
3.4 層級分析法 (AHP) 28
3.4.1 搭配德爾菲法建立層級架構 30
3.4.2 建立比較矩陣 30
3.4.3 檢定一致性 32
3.4.4 整體層級權重的計算 33
3.5 小結 33
第四章 資料分析與研究結果 35
4.1 德爾菲法專家問卷調查之統計資料與分析 35
4.2 AHP專家問卷調查之統計資料與分析 44
4.3 小結 52
第五章 結論與建議 53
5.1 結論 53
5.2 管理意涵 53
5.3 未來研究建議 56
參考文獻 58
附錄 A 67
附錄 B 72
王別瑄,2022,影響傳統製造業導入智慧製造之關鍵因素-以S化纖公司為例,未出版碩士論文,中原大學商學院企業管理學系,桃園。

王涵雁,2021,應用模糊德菲法探討國際彩繪造型競賽之得獎關鍵因素-以World Bodypainting Festival,未出版碩士論文,國立屏東科技大學技職教育研究所,屏東。

江南志,2019,建築設計審議許可的決策傾向與決策溝通之研究,未出版博士論文,國立臺灣科技大學設計學院建築研究所,台北。

李智明、紀彥斌,2021,消費者選擇影音服務平台之關鍵因素-使用層級分析法,輔仁管理評論,28(2),23-54。

余泳儒、江為國、黃仁竑、李新林,2017,TWAREN網路應用-以大學甄選入學系統為例,載於東海大學(主編),TANET2017 臺灣網際網路研討會(265-270)。

何雅惠,2022,以模糊德爾菲法探討海域遊憩活動風險之研究,未出版碩士論文,國立成功大學工學院水利及海洋工程學系,台南。

林彥良,2020,遠距工作的資安風險與防護重點,會計研究月刊,(414),56-62。

林志達,2019,工業製程轉型浪潮下的工控資安,電工通訊季刊,54-69。

徐雅鈴,2018,應用修正式德菲法架構及AHP層級分析建立供應商評選決策模型 - 以A公司之勞務外包為例,未出版碩士論文,國立交通大學工學院工程技術與管理學程,新竹。

孫嘉明、邱靜宜、林宜隆,2017,持續性稽核技術整合架構-以主計資訊系統為例,電腦稽核,(35),80-95。

陳佳秀,2017,創新的密碼檔案外洩偵測機制,未出版碩士論文,國立成功大學電機資訊學院電腦與通信工程研究所,台南。

陳佑寰,2022,反映企業內控治理水準 - 資安事故應變揭露有原則,NetAdmin 網管人,(201),51-52。

陳岱君,2018,在OpenStack上使用分散式路由器設計與實作具備高可用性的異質負載均衡器架構,未出版碩士論文,國立交通大學資訊科學與工程研究所,新竹。

黃明哲,2019,企業資訊安全管理之關鍵因素探討,未出版碩士論文,國立臺北科技大學經營管理系,台北。

黃怡芸,2020,營運持續管理系統(BCMS)之資訊系統導入實務,證券服務,(679),47-50。
黃献誠,2019,運用修正式德菲法及層級分析法(AHP)探究公共工程採行專業營建管理制度對於進度管理之影響,未出版碩士論文,國立交通大學工學院工程技術與管理學程,新竹。

黃峻嘯,2022,應用層級分析法評估進入企業資源規劃服務國際市場之決策分析,未出版碩士論文,國立臺灣大學管理學院在職專班資訊管理組,台北。

黃富祿、張力允、李仁鐘、周碩聰,2010,組織導入雲端運算之資安管理評估,資訊安全通訊,16(4),66-83。

葉雲雲,2023,內部稽核推動資訊安全治理,內部稽核,(121),4-8。

劉祉君,2018,基於瀏覽器之分散式阻斷服務攻擊防禦技術研究,資訊安全通訊, 24(1), 1-17.

劉峻正、張家臻、賴香如、蔡兆勳、明金蓮、董貞吟,2020,運用德菲法建構醫師健康職能專業知能指標之研究,Taiwan Journal of Publich Health/Taiwan Gong Gong Wei Sheng Za Zhi,(39),3。

鄭淑玲,2021,國民中學校園安全指標之建構,未出版碩士論文,國立政治大學,台北。

蔡翼擎、黃翎榛、陳家羚、王馨儀、陳儀倫、林立晴、許芳瑜,2018,以層級分析法探索臺灣手遊產業建構有效創業模式之關鍵決策因子,管理資訊計算,7(1),71-89。

蔡權昱,2012,NCTU CStack:OpenStack 與 Ceph 的整合與應用,未出版碩士論文,國立交通大學資訊科學與工程研究所,新竹。

魏銪志、吳易昇,2022,多產業資訊安全風險評鑑機制之研究,電腦稽核(45),43-65。

羅慧萍,2022,應用層級分析法建構企業併購之決策模型,未出版碩士論文,國立臺灣大學管理學院在職專班財務金融組,台北。

蘇聖凱,2012,應用德菲法與層級分析法建構研發外包供應商評選模式
–以消費型桌上電腦為例,未出版碩士論文,國立臺灣科技大學工業管理系碩士在職專班,台北。

Adamov, A., Carlsson, A., & Surmacz, T. (2019, Sep). An analysis of lockergoga ransomware. In 2019 IEEE East-West Design & Test Symposium (EWDTS) (pp. 1-5). IEEE.

Alessa, L., Moon, S., Griffith, D., & Kliskey, A. (2018). Operator driven policy: Deriving action from data using the quadrant enabled Delphi (QED) method. Homeland Security Affairs, 14.

Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060.

Alwan, Z. S., & Younis, M. F. (2017). Detection and prevention of SQL injection attack: a survey. International Journal of Computer Science and Mobile Computing, 6(8), 5-17.

Baginda, Y. P., Affandi, A., & Pratomo, I. (2018). Analysis of RTO and RPO of a Service Stored on Amazon Web Service (AWS) and Google Cloud Engine (GCE). In 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 418-422). IEEE.

Benitez, C. (2023, Jan 2). 31+ Latest WeChat Statistics For 2023: Usage, Facts, And Trends [Online]. Retrieved on June 24, 2023, from https://startupbonsai.com/wechat-statistics/

Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management science, 9(3), 458-467.

Diamond Paul. (2020, Sep 25). Cloud storage vs. on-premises servers: 9 things to keep in mind [Online]. Retrieved on June 24, 2023, from https://www.microsoft.com/en/microsoft-365/business-insights-ideas/resources/cloud-storage-vs-on-premises-servers

Ehrenfeld, J. M. (2017). Wannacry, cybersecurity and health information technology: A time to act. Journal of medical systems, 41, 1-1.

Hazel, E. (2022, Oct 25). 23 Essential Google Search Statistics for 2022 [Online]. Retrieved on June 24, 2023, from https://fitsmallbusiness.com/google-search-statistics/

Johnson, J. (2021). Number of e-mails per day worldwide 2017-2025. Statista. com, 7.

Kahraman, C., & Otay, I. (2018). Solar PV power plant location selection using a Z-fuzzy number based AHP. International Journal of the Analytic Hierarchy Process, 10(3).

Kuo, Y. F., & Chen, P. C. (2008). Constructing performance appraisal indicators for mobility of the service industries using Fuzzy Delphi Method. Expert systems with applications, 35(4), 1930-1939.

Loveland, S., Dow, E. M., LeFevre, F., Beyer, D., & Chan, P. F. (2008). Leveraging virtualization to optimize high-availability system configurations. IBM Systems Journal, 47(4), 591-604.

Lee, S., & Ross, S. (1995). Disaster recovery planning for information systems. Information Resources Management Journal (IRMJ), 8(3), 18-24.

Lin, Y. (2020). 10 WhatsApp statistics every marketer should know in 2021. Retrieved on June 24, 2023, from https://www.oberlo.co.za/blog/whatsapp-statistics.

Meng, G., Liu, Y., Zhang, J., Pokluda, A., & Boutaba, R. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42.

Miranda, H. (2022, Aug 9). The World Is Moving Beyond Big Data, According to Ocient Survey of 500 Data and Technology Leaders. Retrieved on June 24, 2023, from https://finance.yahoo.com/news/world-moving-beyond-big-data-130000425.html

Mohsin, M. (2020). YouTube stats every marketer should know in 2020. 2021-01-25]. Retrieved on June 24, 2023, from https://www.oberlo.com/blog/youtube-statistics.

Murry, John W., Jr. & Hammons, James O. (1995) "Delphi: A Versatile Methodology for Conducting Qualitative Research. The Review of Higher Education, vol. 18 no. 4, 1995, p. 423-436. Project MUSE, doi:10.1353/rhe.1995.0008.

Naseer, A., Mir, R., Mir, A., & Aleem, M. (2020). Windows-based Ransomware: A Survey. Journal of Information Assurance & Security, 15(3).

Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & management, 42(1), 15-29.
Parikh, M., Verma, S. (2002). Utilizing Internet Technologies to Support Learning: an empirical analysis. International Journal of Information Management, 22(1), 27-46.

Petrenko, A. S. (2018, January). Protection model of PCS of subway from attacks type «wanna cry»,«petya» and «bad rabbit» IoT. In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 945-949). IEEE.

Petrenko, S. A., Vorobieva, D. E. (2021). Secure Software-Defined Storage.

Rowe, G., & Wright, G. (1999, Oct). The Delphi technique as a forecasting tool: issues and analysis. International journal of forecasting, 15(4), 353-375.

Saaty, T. L. (1996). Multicriteria decision making: The analytic hierarchy process. RWS Publ..

Saaty, T. L. (2008). Decision making with the analytic hierarchy process. International journal of services sciences, 1(1), 83-98.

Shirer, M. (2023, Sep 30). IDC Tracker Finds Spending on Compute and Storage Cloud Infrastructure Increased Strongly Across Most Regions in the Second Quarter of 2022. Retrieved on June 24, 2023, from https://www.idc.com/getdoc.jsp?containerId=prUS49732022
Taylor, P. (2021). Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025. IDC & Statista, Jun.

Usharani, S., & Sandhya, S. G. (2020). Detection of ransomware in static analysis by using Gradient Tree Boosting Algorithm. In 2020 International Conference on System, Computation, Automation and Networking (ICSCAN) (pp. 1-5). IEEE.

Vernon, W. (2009). The Delphi technique: a review. International Journal of Therapy and rehabilitation, 16(2), 69-76.

Wise, J. (2022, Jul 28). HOW MANY PICTURES ARE ON INSTAGRAM IN 2023?. Retrieved on June 24, 2023, from https://earthweb.com/how-many-pictures-are-on-instagram/

Yaqub, M. (2022). How Many Tweets per Day 2022 (New Data). Retrieved on June 24, 2023, from Renolon: https://www.renolon.com/number-of-tweets-per-day

Yu, K., Gao, Y., Zhang, P., & Qiu, M. (2015). Design and architecture of dell acceleration appliances for database (DAAD): A practical approach with high availability guaranteed. In 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems (pp. 430-435). IEEE.

電子全文 電子全文(網際網路公開日期:20250831)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊