The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Security Blueprint for E-Business Applications
Abstract
This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.
Related Content
Margee Hume, Paul Johnston.
© 2017.
19 pages.
|
Jessy Nair, D. Bhanu Sree Reddy.
© 2017.
27 pages.
|
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski.
© 2017.
19 pages.
|
Klaus Wölfel.
© 2017.
33 pages.
|
Rui Pedro Marques.
© 2017.
21 pages.
|
Ebru E. Saygili, Arikan Tarik Saygili.
© 2017.
17 pages.
|
Aparna Raman, D. P. Goyal.
© 2017.
41 pages.
|
|
|