IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications
View Sample PDF
Author(s): Jun Du (Tianjin University, China), Yuan-Yuan Jiao (Nankai University, China)and Jianxin ("Roger") Jiao (Nanyang Technological University, Singapore)
Copyright: 2009
Pages: 11
Source title: Selected Readings on Information Technology and Business Systems Management
Source Author(s)/Editor(s): In Lee (Western Illinois University, USA)
DOI: 10.4018/978-1-60566-086-8.ch022

Purchase

View A Security Blueprint for E-Business Applications on the publisher's website for pricing and purchasing information.

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers—from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.

Related Content

Timilehin Olasoji Olubiyi. © 2025. 24 pages.
Joy Eghonghon Akahome, Sidney Ogodo, Timilehin Olasoji Olubiyi. © 2025. 32 pages.
Nurul Hidayana Mohd Noor. © 2025. 28 pages.
Abdulkadri Toyin Alabi. © 2025. 30 pages.
Pooja Darda, Timilehin Olasoji Olubiyi, Olamide Titilayo Ayodeij, Abiodun Richard Obisanya. © 2025. 18 pages.
Priyanka Indoria, Mohd Danish Chishti, Abdullah Bin Junaid. © 2025. 30 pages.
R. Vettriselvan. © 2025. 24 pages.
Body Bottom