The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Security Blueprint for E-Business Applications
Abstract
This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers—from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.
Related Content
Vincent Lennard Kraus.
© 2023.
32 pages.
|
Tlou Maggie Masenya.
© 2023.
16 pages.
|
Arzu Tufan, Gurkan Tuna.
© 2023.
30 pages.
|
Wasswa Shafik.
© 2023.
19 pages.
|
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell.
© 2023.
23 pages.
|
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson.
© 2023.
16 pages.
|
Jorja B. Wright, Darrell Norman Burrell.
© 2023.
12 pages.
|
|
|