IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications
View Sample PDF
Author(s): Jun Du (Tianjin University, China), Yuan-Yuan Jiao (Nankai University, China)and Jianxin (Roger) Jiao (Nanyang Technological University, Singapore)
Copyright: 2009
Pages: 12
Source title: Electronic Business: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): In Lee (Western Illinois University, USA)
DOI: 10.4018/978-1-60566-056-1.ch132

Purchase

View A Security Blueprint for E-Business Applications on the publisher's website for pricing and purchasing information.

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail

Related Content

C. V. Suresh Babu, Sudhir M., George Kishore L., Sanjay Kumar V.. © 2024. 20 pages.
Ridhima Sharma, Amrik Singh. © 2024. 12 pages.
Munir Ahmad. © 2024. 16 pages.
Isuf Qabrati, Elhan Tafili. © 2024. 28 pages.
Peterson K. Ozili, Aamir Aijaz Syed. © 2024. 18 pages.
Samra Jusufi. © 2024. 20 pages.
Halim Bajraktari, Valeri Qatani. © 2024. 13 pages.
Body Bottom