Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0914109-163249 Statistics This thesis had been viewed 3016 times. Download 2077 times. Author Wei-Min Huang Author's Email Address No Public. Department Computer Science and Enginerring Year 2008 Semester 2 Degree Master Type of Document Master's Thesis Language zh-TW.Big5 Chinese Page Count 43 Title An Implementation of Information Equipment Availability Monitoring System Keyword Network monitor Information Security Management System (ISMS) Information Security Management System (ISMS) Network monitor Abstract The number of servers and network equipment increase dramatically in recent years due to the explosive growth of the internet and the services built upon it. This implies that the working load of the system administrators is increased accordingly. There are many management software developed to help the administrators in managing the servers and network equipment. However, most of these products are designed for specific range of management tasks. That is, there are almost no single product can fulfill all the needs of the administrator or may not consider the security management and control mechanism addressed in the information security management system (ISMS). In this thesis, we propose a service equipment availability monitoring system which utilizes a real-time detection of server and switch system and a recording and reporting mechanism to conform the requirements of the information security management system.. From the analysis of the event logs and the reports of the proposed system, we can see that the system can detect the failure and deliver the warning message to the administrator immediately after the service being identified as not available. The result is a dramatic reduction of the system failure recovery time. Also, we can discover the most frequent failure locations or equipments from the event log which is an important reference for risk assessment and asset management. Advisor Committee Tsang-Long Pao - advisor
Huei-Chung Chu - co-chair
Shang-Lin Hsieh - co-chair
Files Date of Defense 2009-07-31 Date of Submission 2009-09-14