Skip to Content
Preventing Identity Theft in Your Business
book

Preventing Identity Theft in Your Business

by Judith M. Collins
March 2005
Intermediate to advanced
256 pages
5h 28m
English
Wiley
Content preview from Preventing Identity Theft in Your Business

CHAPTER 7THE BISP PLAN: TIGHTEN YOUR BUSINESS BORDERS

Large and small businesses alike, whether domestic, international, or multinational and regardless of service, product, or market, share in certain common assets.

BACKGROUND REVIEW: FOUR-FACTOR MODEL OF INFORMATION SECURITY

There are four valuable assets that all businesses share:

  1. People (employees and customers)
  2. Work processes
  3. Proprietary information
  4. Property

These four factors, or security fronts, are highly interdependently integrated: people in their work processes verify, validate, manage, and maintain “personal” and “business” information using business properties—both actual (computers) and virtual (e-business Web sites). This integrated interdependency across the four factors means that businesses must secure each factor in order to ultimately secure their business borders.

Conveniently, the Business Information Security Program (BISP) is universally applicable; that is, the methods and the exercises used to develop the Security Standards apply similarly to all types of businesses. The only difference businesses will experience in applying the BISP is the time required to complete each exercise: The greater the size and/or complexity of the company, the greater the time requirement. Nevertheless, even the largest and most complex business enterprise can afford the time required to secure its assets, beginning with the first front, the people.

People: The First Factor

The primary assets of every business are people: ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

The Truth About Identity Theft

The Truth About Identity Theft

Jim Stickley
Practical Problem-Solving Skills in the Workplace

Practical Problem-Solving Skills in the Workplace

Judith Combes Taylor, Rebekah Lashman, Pamela Helling

Publisher Resources

ISBN: 9780471694694Purchase book