This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.
[1]
Stephen J. Andriole.
Who's Here?
,
2005
.
[2]
Latif Al-Hakim,et al.
Business Web Strategy: Design, Alignment, and Application
,
2008
.
[3]
Massimo Memmola,et al.
Web & RFID Technology: New Frontiers in Costing and Process Management for Rehabilitation Medicine
,
2009
.
[4]
Michael Bourlakis,et al.
E-Consumer Behaviour: Past, Present and Future Trajectories of an Evolving Retail Revolution
,
2008,
Int. J. E Bus. Res..
[5]
Prasad Bingi,et al.
The Challenges Facing Global E-Commerce
,
2000,
Inf. Syst. Manag..