{"title":"企业信息体系结构的建立研究","authors":"Tsang-Hung Wu, Shyh-Chang Liu","doi":"10.1109/ICITST.2009.5402556","DOIUrl":null,"url":null,"abstract":"Following the progress of technology in recent years, enterprise is paying more and more attention on the topic of information security. However, the scope covered by information security is extremely broad. In fact it is almost impossible to achieve 100% security. In addition, this will consume extremely large enterprise resource. The most important is to base on the overall operation method of the enterprise to establish more complete information flow and architecture with overall planning vision. This paper will first discuss on ITIL, ISO27001 risk management and commonly seen information protection technology, and how to establish the enterprise information.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A research on the establishment of enterprise information architecture\",\"authors\":\"Tsang-Hung Wu, Shyh-Chang Liu\",\"doi\":\"10.1109/ICITST.2009.5402556\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Following the progress of technology in recent years, enterprise is paying more and more attention on the topic of information security. However, the scope covered by information security is extremely broad. In fact it is almost impossible to achieve 100% security. In addition, this will consume extremely large enterprise resource. The most important is to base on the overall operation method of the enterprise to establish more complete information flow and architecture with overall planning vision. This paper will first discuss on ITIL, ISO27001 risk management and commonly seen information protection technology, and how to establish the enterprise information.\",\"PeriodicalId\":251169,\"journal\":{\"name\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2009.5402556\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402556","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A research on the establishment of enterprise information architecture
Following the progress of technology in recent years, enterprise is paying more and more attention on the topic of information security. However, the scope covered by information security is extremely broad. In fact it is almost impossible to achieve 100% security. In addition, this will consume extremely large enterprise resource. The most important is to base on the overall operation method of the enterprise to establish more complete information flow and architecture with overall planning vision. This paper will first discuss on ITIL, ISO27001 risk management and commonly seen information protection technology, and how to establish the enterprise information.