Putting an End to Account-Hijacking Identity Theft: Study Supplement
-
06/17/2005
Details
-
Publisher's site:https://www.fdic.gov/ | FDIC.gov
-
Corporate Authors:
-
Description:Introduction (Pg 4)
Part 1: Public Comments and the FDIC's Response to Them (Pg 4)
Summary of Public Comments (Pg 4)
The FDIC’s Response to the Comments (Pg 8)
Part 2: More-Recent Trends in Identity Theft (Pg 11)
Size of the Problem (Pg 11)
Manner of Perpetration (Pg 12)
Indirect Costs (Pg 12)
The Reaction of Banks (Pg 14)
Layered Mitigation Approach (Pg 14)
Consumer Acceptance of Stronger Authentication (Pg 15)
Examples of Two-Factor Authentication (Pg 17)
Part 3: Technologies to Mitigate Account Hijacking (Pg 20)
Internet Protocol Address (IPA) Location and Geo-Location (Pg 21)
Mutual Authentication (Pg 22)
Device Authentication (Pg 23)
Non-Hardware-Based One-Time-Password Scratch Card (Pg 23)
Trusted Platform Module (TPM) Chip (Pg 24)
User-Based Software to Detect Phishing and Fraudulent Web Sites (Pg 25)
Out-of-Band Authentication (Pg 26)
Part 4: Findings (Pg 27)
References (Pg 28)
-
Content Notes:Table 1: How Victims' Information is Misused (Pg 11)
Table 2: Domestic Interest in Two-Factor Authentication Programs (Pg 18)
Table 3: International Interest in Two-Factor Authentication Programs (Pg 19)
-
Pages in Document:29
-
Dataset Download URL:
-
Format:
-
Release Date:06/17/2005
-
Agencies Involved:Federal Deposit Insurance Corporation (FDIC) ; Federal Trade Commission (FTC)
-
Law Involved:Gramm-Leach-Bliley Act (GLBA)
-
Source:FDIC Website
-
Main Document Checksum:urn:sha256:be84659c5c3c27a4fe33d8ad5148e1e1996d0a10b5c8cb5de8b3a3c539b5860b
-
Download URL:
-
File Type:
ON THIS PAGE
FDIC Archive documents are authentic reproductions of FDIC publications that reflect the language and context of the time
they were published, ensuring authenticity and historical integrity while providing public access and transparency.
You May Also Like
COLLECTION
FDIC Publications