A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications

Jun Du (Tianjin University, China), Yuan-Yuan Jiao (Nankai University, China) and Jianxin (Roger) Jiao (Nanyang Technological University, Singapore)
DOI: 10.4018/978-1-60566-056-1.ch132
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail

Complete Chapter List

Search this Book:
Reset