A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications

Jun Du, Yuan-Yuan Jiao, Jianxin ("Roger") Jiao
ISBN13: 9781605660868|ISBN10: 1605660868|EISBN13: 9781605660875
DOI: 10.4018/978-1-60566-086-8.ch022
Cite Chapter Cite Chapter

MLA

Du, Jun, et al. "A Security Blueprint for E-Business Applications." Selected Readings on Information Technology and Business Systems Management, edited by In Lee, IGI Global, 2009, pp. 416-426. https://doi.org/10.4018/978-1-60566-086-8.ch022

APA

Du, J., Jiao, Y., & Jiao, J. R. (2009). A Security Blueprint for E-Business Applications. In I. Lee (Ed.), Selected Readings on Information Technology and Business Systems Management (pp. 416-426). IGI Global. https://doi.org/10.4018/978-1-60566-086-8.ch022

Chicago

Du, Jun, Yuan-Yuan Jiao, and Jianxin ("Roger") Jiao. "A Security Blueprint for E-Business Applications." In Selected Readings on Information Technology and Business Systems Management, edited by In Lee, 416-426. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-086-8.ch022

Export Reference

Mendeley
Favorite

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers—from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.