BOOK-CHAPTER

A Security Blueprint for E-Business Applications

Abstract

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers—from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.

Keywords:
Blueprint Process management Software deployment Computer security Security management Business process Computer science Business Engineering Operations management Work in process Software engineering

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.46
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Information Technology Governance and Strategy
Social Sciences →  Business, Management and Accounting →  Management Information Systems

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.