This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.
Jun DuYuanyuan JiaoJianxin Jiao
Jun DuYuanyuan JiaoJianxin Jiao
Jun DuYuanyuan JiaoJianxin Jiao
Jun DuYuanyuan JiaoJianxin Jiao
Jun DuYuanyuan JiaoJianxin Jiao