Implementing a Secure E-Commerce Web Site
暂无分享,去创建一个
This chapter explains how to create the actual infrastructure to build, manage, and maintain the site. Depending on the business idea and the logistics involved, the actual implementation may vary slightly from the designs included in the chapter, but the basic concepts remain the same. The chapter explores the process of grouping the systems together in common areas as defined by their requirements for security. These groupings or security zones are regulated by the control systems (such as firewalls and routers) that are deployed in the site. They will also be monitored against attack by intrusion detection systems (IDSs) and other tools deployed within the environment. This chapter discusses some options and considerations for outsourcing the site to a partner at this stage of the project and examines how to select the right partner and the right type of outsourcing solution to meet one's requirements, as well as explore the various types of solutions available.