4.7. Approaches for securing e-business solutions
This section summarizes the security solutions using the architectures described in 4.5, “Techniques for securing the end-to-end model” on page 120.
4.7.1. Securing e-business using packet filtering and application firewalls
In the scenario illustrated in Figure 4-24, there is a business requirement to provide external access to enterprise data and applications.
Figure 4-24. Hosting solution using packet filtering and application proxies
In this scenario, the security and management requirements include:
Address hiding to provide a level of confidentiality
Protecting the integrity of the enterprise ...
Get IBM e-business Technology, Solution, and Design Overview now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.