A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications

Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao
ISBN13: 9781591409113|ISBN10: 159140911X|ISBN13 Softcover: 9781591409120|EISBN13: 9781591409137
DOI: 10.4018/978-1-59140-911-3.ch006
Cite Chapter Cite Chapter

MLA

Du, Jun, et al. "A Security Blueprint for E-Business Applications." Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, edited by Merrill Warkentin and Rayford Vaughn, IGI Global, 2006, pp. 80-94. https://doi.org/10.4018/978-1-59140-911-3.ch006

APA

Du, J., Jiao, Y., & Jiao, J. R. (2006). A Security Blueprint for E-Business Applications. In M. Warkentin & R. Vaughn (Eds.), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 80-94). IGI Global. https://doi.org/10.4018/978-1-59140-911-3.ch006

Chicago

Du, Jun, Yuan-Yuan Jiao, and Jianxin (Roger) Jiao. "A Security Blueprint for E-Business Applications." In Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, edited by Merrill Warkentin and Rayford Vaughn, 80-94. Hershey, PA: IGI Global, 2006. https://doi.org/10.4018/978-1-59140-911-3.ch006

Export Reference

Mendeley
Favorite

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.