IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Security Blueprint for E-Business Applications

A Security Blueprint for E-Business Applications
View Sample PDF
Author(s): Jun Du (Tianjin University, China), Yuan-Yuan Jiao (Nankai University, China)and Jianxin (Roger) Jiao (Nanyang Technological University, Singapore)
Copyright: 2006
Pages: 15
Source title: Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Source Author(s)/Editor(s): Merrill Warkentin (Mississippi State University, USA)and Rayford Vaughn (Mississippi State University, USA)
DOI: 10.4018/978-1-59140-911-3.ch006

Purchase

View A Security Blueprint for E-Business Applications on the publisher's website for pricing and purchasing information.

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom