English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 116849/147881 (79%)
Visitors : 63921485      Online Users : 616
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/157701


    Title: 導入人工智能技術對於資訊安全產品及市場之影響:以 Palo Alto Networks 轉型為例
    The impact of artificial intelligence technology adoption on cyber security products and markets: The case study of Palo Alto Networks
    Authors: 吳昭明
    Wu, Chao-Ming
    Contributors: 張瑜倩
    吳昭明
    Wu Chao-Ming
    Keywords: 人工智能
    資訊安全
    資安自動化
    資安威脅
    artificial intelligence
    information security
    information security automation
    information security threats
    Date: 2025
    Issue Date: 2025-07-01 14:23:50 (UTC+8)
    Abstract: 隨著人工智能技術的快速發展,資訊安全產品的設計和功能正在經歷深刻變革。本論文研究是透過次級資料分析與案例研究,探討人工智能技術對資訊安全產品性能的影響以及市場結構的變化。研究發現,人工智能驅動的資訊安全解決方案有效提升了威脅檢測與應變能力,但同時面臨資料隱私、法規遵循與技術透明性等挑戰。本研究以資訊安全廠商Palo Alto Networks為研究案例,研究在人工智能技術導入中的策略選擇提供實務建議,並分析未來市場的發展趨勢。
    Palo Alto Networks作為資訊安全領域的領先者,積極投入人工智能的研究與應用,旨在加強其產品的防護能力,提升安全事件的偵測和響應效率。Palo Alto Networks 的人工智能發展致力於通過自動化和智能化來改善安全防護,從行為分析、自動化威脅檢測到整合的安全平台,無不展現出其對於利用前沿技術來應對未來挑戰的決心與策略。本論文對 Palo Alto Networks 在人工智能領域的發展軌跡進行探討,分析其如何通過創新技術來應對不斷演變的資訊安全威脅。人工智能系統還具備強大的威脅情報整合能力,能夠即時收集與分析全球安全情資,為用戶提供最新的防禦策略。人工智能的引入不僅可以提升防護的效率,還能大幅度增強系統的反應能力和自主學習能力人工智能技術發展還將集中在如何提升安全產品的協同工作能力,從而實現整體網絡安全架構的智能化。隨著不同安全領域產品之間協作需求的增強,如何讓不同的安全系統協同工作,進行信息共享和威脅聯動,成為未來的重要發展方向
    With the rapid development of artificial intelligence technology, the design and functions of information security products are undergoing profound changes. This paper explores the impact of artificial intelligence technology on the performance of information security products and the changes in market structure through secondary data analysis and case studies. The study found that AI-driven information security solutions effectively improved threat detection and response capabilities, but at the same time faced challenges such as data privacy, regulatory compliance and technical transparency. This study uses the information security vendor Palo Alto Networks as a case study to provide practical suggestions for strategic choices in the introduction of artificial intelligence technology and analyze future market development trends.
    As a leader in information security, Palo Alto Networks is actively engaged in the research and application of artificial intelligence, aiming to enhance the protection capabilities of its products and improve the efficiency of detecting and responding to security incidents. Palo Alto Networks' artificial intelligence development is committed to improving security protection through automation and intelligence. From behavioral analysis, automated threat detection to integrated security platforms, it demonstrates its determination and strategy to use cutting-edge technologies to meet future challenges. This article will explore Palo Alto Networks' development trajectory in the field of artificial intelligence and analyze how it uses innovative technologies to respond to evolving information security threats.
    Reference: CIO Taiwan (2024)。人工智慧 (AI) 對攻擊與防禦的影響。檢索自:https://www.cio.com.tw/the-impact-of-artificial-intelligence-ai-on-attack-and-defense/(檢索日期 February 8, 2025)。
    Cybersecurity Ventures (2025). Global Ransomware Damage Costs Predicted To Exceed $275 Billion By 2031. Available at: https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/?utm_source=chatgpt.com [accessed on: 15 April, 2025].
    Dell, M. (2014). Michael Dell on Why Data Security Is the Most Important Issue You Face. Available at: https://www.inc.com/michael-dell/why-data-security-is-the-most-important-issue-you-face.html [accessed on March 2, 2025].
    Emgarcia (2024). 5 Unique Challenges for AI in Cybersecurity, Palo Alto Networks Live community. Availabe at: https://live.paloaltonetworks.com/t5/community-blogs/5-unique-challenges-for-ai-in-cybersecurity/ba-p/581439 [access on April 2, 2025].
    Forrester (2024), Top Cybersecurity Threats In 2024. Available at: https://www.forrester.com/what-it-means/ep365-top-threats-2024/ [accessed on April 20, 2025].
    Gartner Research (2024), Forecast Analysis: Information Security, worldwide. Available at: https://www.gartner.com/en/documents/5815415 [accessed on March 20, 2025].
    Gartner Magic Quadrant for Endpoint Protection Platforms (2023)
    Gartner Magic Quadrant for Network Firewalls (2022) https://www.gartner.com/en/documents/4022346 [accessed on March 20, 2025].
    George, A. S. (2024). Emerging trends in AI-powered cybersecurity: An in-depth analysis. Partners Universal Innovative Research Publication, 2(4). Available at: https://puirp.com/index.php/research/article/view/65 [accessed on March 31, 2025].
    Grand View Research (2023). Cyber Security Market Analysis 2025-2030. Available at: https://www.grandviewresearch.com/industry-analysis/cyber-security-market [accessed on January 19, 2025].
    IDC Research (2024). Available at: https://www.idc.com/getdoc.jsp?containerId=prUS52579424 [accessed on March 20, 2025].
    Kommrusch, S. (2019). Artificial Intelligence Techniques for Security Vulnerability Prevention. Available at: https://arxiv.org/abs/1912.06796?utm_source=chatgpt.com [accessed on January 29, 2025].
    Kommrusch, S. (2018). Artificial Intelligence Techniques for Security Vulnerability Prevention. Available at: https://arxiv.org/pdf/1912.06796 [accessed on February 11, 2025].
    McAfee, A. (2017) The. Business of Artificial Intelligence. Harvard Business Review. Available at: https://hbr.org/2017/07/the-business-of-artificial-intelligence [accessed on March 5, 2025]
    McDade, A. (2024). Palo Alto Networks Tops Estimates, Announces Stock Split. Available at: https://www.investopedia.com/palo-alto-networks-earnings-stock-split-q1-fy2025-8749293?utm_source=chatgpt.com [accessed on March 28, 2025].
    Okdem, S. & Okdem, S. (2024). Artificial Intelligence in Cybersecurity: A Review and a Case Study by Selcuk Okdem. Applied Science. DOI: https://www.mdpi.com/2076-3417/14/22/10487?utm_source=chatgpt.com.
    PYMNTS (2015). Obama: Cybersecurity is shared responsibility. Available at: https://www.utmb.edu/president/communications/latest-message/article-detail/communications/2024/12/18/cybersecurity-is-a-shared-responsibility [accessed on March 30, 2025].
    Reutuers, (2024). Palo Alto tops revenue and profit estimates on steady cybersecurity demand. Available at: https://www.reuters.com/technology/cybersecurity/palo-alto-tops-revenue-profit-estimates-steady-cybersecurity-demand-2024-11-20/?utm_source=chatgpt.com [accessed on March 30, 2025].
    Rogers, E. (1983). Diffusion of Innovations. NY: The Free Press.
    Rundle, J. (2024). Palo Alto Networks Pushes Forward with Platform Drive. Availabe at: https://www.wsj.com/articles/palo-alto-networks-pushes-forward-with-platform-drive-64b90a75?utm_source=chatgpt.com [accessed on: 19 March, 2025].
    安永台灣(2023)。人工智慧如何影響網路安全和安全管理。檢索自: https://www.ey.com/zh_tw/insights/consulting/impact-of-ai-on-cybersecurity?utm_source=chatgpt.com [檢索日期:January 10, 2025].金融監督管理委員(2024)。金融業運用人工智慧(AI)指引。檢索自:https://www.fsc.gov.tw/websitedowndoc?file=chfsc/202408231741530.pdf&filedisplay=%E9%99%84%E4%BB%B6_%E9%87%91%E8%9E%8D%E6%A5%AD%E9%81%8B%E7%94%A8AI%E6%8C%87%E5%BC%95.pdf [檢索日期:13 February 2025].
    黃彥棻(2024)。【2024臺灣資安年鑑|資安十年特輯】資安產業具備輕資產、高價值特性,吸引年輕人投入創業。檢索自https://www.ithome.com.tw/article/163110(檢索日期:April 10 2025)。
    謝明華(2020)。AI 在金融產業發展的應用及潛在衝擊。檢索自 https://www.tpefx.com.tw/uploads/download/tw/Application%20and%20potential%20impact%20of%20AI%20in%20the%20development%20of%20the%20financial%20industry.pdf(檢索日期:April 10 2025)。
    Description: 碩士
    國立政治大學
    經營管理碩士學程(EMBA)
    112932080
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0112932080
    Data Type: thesis
    Appears in Collections:[經營管理碩士學程EMBA] 學位論文

    Files in This Item:

    File SizeFormat
    208001.pdf2780KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback