A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications

Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao
ISBN13: 9781605660561|ISBN10: 1605660566|EISBN13: 9781605660578
DOI: 10.4018/978-1-60566-056-1.ch132
Cite Chapter Cite Chapter

MLA

Du, Jun, et al. "A Security Blueprint for E-Business Applications." Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, IGI Global, 2009, pp. 2131-2142. https://doi.org/10.4018/978-1-60566-056-1.ch132

APA

Du, J., Jiao, Y., & Jiao, J. R. (2009). A Security Blueprint for E-Business Applications. In I. Lee (Ed.), Electronic Business: Concepts, Methodologies, Tools, and Applications (pp. 2131-2142). IGI Global. https://doi.org/10.4018/978-1-60566-056-1.ch132

Chicago

Du, Jun, Yuan-Yuan Jiao, and Jianxin (Roger) Jiao. "A Security Blueprint for E-Business Applications." In Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, 2131-2142. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-056-1.ch132

Export Reference

Mendeley
Favorite

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.