The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Security Blueprint for E-Business Applications
|
Author(s): Jun Du (Tianjin University, China), Yuan-Yuan Jiao (Nankai University, China)and Jianxin (Roger) Jiao (Nanyang Technological University, Singapore)
Copyright: 2009
Pages: 12
Source title:
Electronic Business: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): In Lee (Western Illinois University, USA)
DOI: 10.4018/978-1-60566-056-1.ch132
Purchase
|
Abstract
This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail
Related Content
Emrah Arğın.
© 2022.
16 pages.
|
Ebru Gülbuğ Erol, Mustafa Gülsün.
© 2022.
17 pages.
|
Yeşim Şener.
© 2022.
18 pages.
|
Salim Kurnaz, Deimantė Žilinskienė.
© 2022.
20 pages.
|
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng.
© 2022.
29 pages.
|
Savas S. Ates, Vildan Durmaz.
© 2022.
24 pages.
|
Nusret Erceylan, Gaye Atilla.
© 2022.
20 pages.
|
|
|