Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 工學院
  3. 工業工程學研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49111
Title: 破壞式創新對網路安全產業之影響
The effect of destructive innovation on network security industries
Authors: Eng-Wen Lin
林應穩
Advisor: 洪一薰(I-Hsuan Hong)
Keyword: UTM防火牆,破壞式創新理論,駭客攻擊,
UTM Firewall,disruptive innovation,hacker attacks,
Publication Year : 2016
Degree: 碩士
Abstract: 隨著網際網路應用的普及並且深入各個應用領域,當TCP/IP(Transmission Control Protocol /Internet Protocol)的使用標準化之後,各種應用系統都以TCP/IP當信號傳輸的協定,如電力、水力、空調、溫控、燈控等。優點是各應用系統的溝通標準化、簡單化。缺點是網路駭客入侵以及病毒的傳遞也順著TCP/IP的規範進行。為了應付駭客攻擊,網路資訊安全產業不斷地提升他們的防駭技術。多樣化的資安設備雖然可以防止駭客攻擊,但是並不是每一個企業或政府單位買得起所有的資安防護設備。本研究的目的主要是以Christensen(1997)所提出的破壞式創新理論的三個策略從技術、價格、商業模式的創新方法來驗證從防火牆到UTM(Unified Threat Management)防火牆的破壞式創新模式,尋找技術有效,價格合理的資訊安全設備。本研究結果為:1. 防火牆到UTM防火牆是一個破壞式創新的途徑,也成為後來資安設備的趨勢、2. UTM防火牆在中低階設備透過價格上的破壞性創新,使得設備更普及、3. UTM中高階防火牆可以透過商業模式的破壞式創新模式,達成價格降低全民受惠,並且建構更全面的防駭客攻擊的目的。
With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control, etc. The advantage is the standardization and simplification among various application systems. The disadvantage is that the network hackers and virus attack application systems via TCP/IP. In order to deal with hackers, network information security industries continue to improve their anti-hack technique. Although a variety of information security devices can prevent hacker from attacks, but not every enterprises or government unit is affordable of all the information security protective equipment. This study utilizes the theory of destructive innovation (Christensen 1997) as a tool to analyze the competitive advantage in three aspects: technology, price, innovative business model Finally, the findings of the study are : 1. Firewall to the UTM Firewall is a way of disruptive innovation, and is also the information security device trend; 2. through the disruptive innovation of middle and low-end UTM firewall devices, the device can be more popular; 3. Customers can benefit from a lower price of a high-end UTM firewall through the disruptive innovation of business model.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49111
DOI: 10.6342/NTU201602861
Fulltext Rights: 有償授權
Appears in Collections:工業工程學研究所

Files in This Item:
File SizeFormat 
ntu-105-1.pdf
  Restricted Access
2.28 MBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved