4.5. Techniques for securing the end-to-end model
An e-business must provide assurance that the infrastructure and application resources, including systems, networks, and data, are protected with regard to confidentiality and integrity. This includes protecting the enterprise network and systems from various forms of attack. It also requires that the communications between the consumer and the application are secure and confidential.
4.5.1. Firewalls
A firewall is a combination of hardware and software that sits in the entry point to the company network (or the point where a company network is connected to the Internet). It monitors the type of traffic that comes into the company network, and it decides whether a packet is allowed to enter. ...
Get IBM e-business Technology, Solution, and Design Overview now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.