• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 14. Security > Security Design

Security Design

With these issues in mind, we turn to the high-level design of secure systems. The security design should be part of a project from its very beginning, because it is much more expensive to add security after the fact than to design security into the system from the start. We recommend following a five-step process for the security design of a system for electronic commerce.

1.
Create the security policy.

2.
Add appropriate security mechanisms to the application.

3.
Design the security of the physical, network, and computer system environment.

4.
Develop feedback, monitoring, and auditing mechanisms to observe the system in operation.

5.
Use the results of monitoring and auditing to refine the design, implementation, and operation of the system.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint