Skip to main content

Advertisement

Log in

Establish a secure and trustworthy ICT environment for educational systems: a case study

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Nowadays information and communication security has recently emerged as one of the most important tasks in the field of network management, operations and maintenance. The information security issue is of particular importance to the Taiwan Academic Network, a network which connects the networks of educational and research institutions in Taiwan. ICT environment in educational systems involves vast connected units and is featuring complexity, diversity and openness. In this paper, we investigate current situation of Taiwan Ministry of Education ICT security development and provide a case study. We also discussed challenges and solutions for improving ICT security environment in educational system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Chu H., Deng D., Chao H., Huang Y. (2009) Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears. Journal of Universal Computer Science 15(12): 2373–2386

    Google Scholar 

  • Computer Center of MOE (MOECC). (2010). http://english.moe.gov.tw/ct.asp?xItem=579&ctNode=363. Accessed 25 April 2010.

  • Deming, W. E. (1986). Out of the Crisis. MIT Center for Advanced Engineering Study. ISBN 0-911379-01-0.

  • Farn K., Lin S., Lo C. (2008) A study on e-Taiwan information system security classification and implementation. Computer Standards & Interfaces 30: 1–7

    Article  Google Scholar 

  • Frederick, C. (2002). Information Assurance Technical Framework. Release 3.1. National Security Agency. https://www.iad.gov/library/iacf.cfm. Accessed 25 April 2010.

  • ISO/IEC. (2005). Information technology—Code of practice for information security management. ISO/IEC 17799:2005(E).

  • Kang, S., Park, J. H., Kahn, M. K., & Kwak, J. (2009). Study on the common criteria methodology for secure ubiquitous environment construction. Journal of Intelligent Manufacturing, doi:10.1007/s10845-009-0363-x.

  • Lai S., Hsieh M., Kuo W. (2003) Design and implementation of an intelligent defense system against network security incidents. Journal of Internet Technology 4(2): 119–125

    Google Scholar 

  • Ministry of Education (MOE) of the R.O.C. (Taiwan). (2010). http://english.moe.gov.tw. Accessed 25 April 2010.

  • Sardana, A., Joshi, R. C., Kim, T., & Jang, S. (2008). Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach. Journal of Intelligent Manufacturing, doi:10.1007/s10845-008-0204-3.

  • The Executive Yuan National Information Communication Security Taskforce (NICST) of Republic of China (R.O.C.). (2009). Information security dispatch document No. 0980100328, 2009-06-01.

  • The Executive Yuan National Information Communication Security Taskforce (NICST) of Republic of China (R.O.C.). (2010). http://www.nicst.nat.gov.tw. Accessed 25 April 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han-Chieh Chao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chuang, YH., Chen, CY., Wu, TC. et al. Establish a secure and trustworthy ICT environment for educational systems: a case study. J Intell Manuf 23, 965–975 (2012). https://doi.org/10.1007/s10845-011-0503-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-011-0503-y

Keywords

Navigation