Putting an End to Account-Hijacking Identity Theft: Study Supplement
Advanced Search
Select up to three search categories and corresponding keywords using the fields to the right. Refer to the Help section for more detailed instructions.

Search our Collections & Repository

All these words:

For very narrow results

This exact word or phrase:

When looking for a specific result

Any of these words:

Best used for discovery & interchangable words

None of these words:

Recommended to be used in conjunction with other fields

Language:

Dates

Publication Date Range:

to

Document Data

Title:

Document Type:

Library

Collection:

Series:

People

Author:

Help
Clear All

Query Builder

Query box

Help
Clear All

For additional assistance using the Custom Query please check out our Help Page

i

Putting an End to Account-Hijacking Identity Theft: Study Supplement

Filetype[PDF-104.33 KB]



Details:

  • Publisher's site:
    https://www.fdic.gov/ | FDIC.gov
  • Description:
    Introduction (Pg 4)

    Part 1: Public Comments and the FDIC's Response to Them (Pg 4)

    Summary of Public Comments (Pg 4)

    The FDIC’s Response to the Comments (Pg 8)

    Part 2: More-Recent Trends in Identity Theft (Pg 11)

    Size of the Problem (Pg 11)

    Manner of Perpetration (Pg 12)

    Indirect Costs (Pg 12)

    The Reaction of Banks (Pg 14)

    Layered Mitigation Approach (Pg 14)

    Consumer Acceptance of Stronger Authentication (Pg 15)

    Examples of Two-Factor Authentication (Pg 17)

    Part 3: Technologies to Mitigate Account Hijacking (Pg 20)

    Internet Protocol Address (IPA) Location and Geo-Location (Pg 21)

    Mutual Authentication (Pg 22)

    Device Authentication (Pg 23)

    Non-Hardware-Based One-Time-Password Scratch Card (Pg 23)

    Trusted Platform Module (TPM) Chip (Pg 24)

    User-Based Software to Detect Phishing and Fraudulent Web Sites (Pg 25)

    Out-of-Band Authentication (Pg 26)

    Part 4: Findings (Pg 27)

    References (Pg 28)

  • Content Notes:
    Table 1: How Victims' Information is Misused (Pg 11)

    Table 2: Domestic Interest in Two-Factor Authentication Programs (Pg 18)

    Table 3: International Interest in Two-Factor Authentication Programs (Pg 19)

  • Pages in Document:
    29
  • Format:
  • Release Date:
    06/17/2005
  • Agencies Involved:
    Federal Deposit Insurance Corporation (FDIC);Federal Trade Commission (FTC);
  • Law Involved:
    Gramm-Leach-Bliley Act (GLBA)
  • Source:
    FDIC Website
  • Main Document Checksum:
  • File Type:

Supporting Files

  • No Additional Files

More +

You May Also Like

Checkout today's featured content at archive.fdic.gov

Version 3.26