Abstract
Nowadays information and communication security has recently emerged as one of the most important tasks in the field of network management, operations and maintenance. The information security issue is of particular importance to the Taiwan Academic Network, a network which connects the networks of educational and research institutions in Taiwan. ICT environment in educational systems involves vast connected units and is featuring complexity, diversity and openness. In this paper, we investigate current situation of Taiwan Ministry of Education ICT security development and provide a case study. We also discussed challenges and solutions for improving ICT security environment in educational system.
Similar content being viewed by others
References
Chu H., Deng D., Chao H., Huang Y. (2009) Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears. Journal of Universal Computer Science 15(12): 2373–2386
Computer Center of MOE (MOECC). (2010). http://english.moe.gov.tw/ct.asp?xItem=579&ctNode=363. Accessed 25 April 2010.
Deming, W. E. (1986). Out of the Crisis. MIT Center for Advanced Engineering Study. ISBN 0-911379-01-0.
Farn K., Lin S., Lo C. (2008) A study on e-Taiwan information system security classification and implementation. Computer Standards & Interfaces 30: 1–7
Frederick, C. (2002). Information Assurance Technical Framework. Release 3.1. National Security Agency. https://www.iad.gov/library/iacf.cfm. Accessed 25 April 2010.
ISO/IEC. (2005). Information technology—Code of practice for information security management. ISO/IEC 17799:2005(E).
Kang, S., Park, J. H., Kahn, M. K., & Kwak, J. (2009). Study on the common criteria methodology for secure ubiquitous environment construction. Journal of Intelligent Manufacturing, doi:10.1007/s10845-009-0363-x.
Lai S., Hsieh M., Kuo W. (2003) Design and implementation of an intelligent defense system against network security incidents. Journal of Internet Technology 4(2): 119–125
Ministry of Education (MOE) of the R.O.C. (Taiwan). (2010). http://english.moe.gov.tw. Accessed 25 April 2010.
Sardana, A., Joshi, R. C., Kim, T., & Jang, S. (2008). Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach. Journal of Intelligent Manufacturing, doi:10.1007/s10845-008-0204-3.
The Executive Yuan National Information Communication Security Taskforce (NICST) of Republic of China (R.O.C.). (2009). Information security dispatch document No. 0980100328, 2009-06-01.
The Executive Yuan National Information Communication Security Taskforce (NICST) of Republic of China (R.O.C.). (2010). http://www.nicst.nat.gov.tw. Accessed 25 April 2010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chuang, YH., Chen, CY., Wu, TC. et al. Establish a secure and trustworthy ICT environment for educational systems: a case study. J Intell Manuf 23, 965–975 (2012). https://doi.org/10.1007/s10845-011-0503-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-011-0503-y