Details:
-
Publisher's site:https://www.fdic.gov/ | FDIC.gov
-
Corporate Authors:
-
Description:Introduction (Pg 4)
Part 1: Public Comments and the FDIC's Response to Them (Pg 4)
Summary of Public Comments (Pg 4)
The FDIC’s Response to the Comments (Pg 8)
Part 2: More-Recent Trends in Identity Theft (Pg 11)
Size of the Problem (Pg 11)
Manner of Perpetration (Pg 12)
Indirect Costs (Pg 12)
The Reaction of Banks (Pg 14)
Layered Mitigation Approach (Pg 14)
Consumer Acceptance of Stronger Authentication (Pg 15)
Examples of Two-Factor Authentication (Pg 17)
Part 3: Technologies to Mitigate Account Hijacking (Pg 20)
Internet Protocol Address (IPA) Location and Geo-Location (Pg 21)
Mutual Authentication (Pg 22)
Device Authentication (Pg 23)
Non-Hardware-Based One-Time-Password Scratch Card (Pg 23)
Trusted Platform Module (TPM) Chip (Pg 24)
User-Based Software to Detect Phishing and Fraudulent Web Sites (Pg 25)
Out-of-Band Authentication (Pg 26)
Part 4: Findings (Pg 27)
References (Pg 28)
-
Content Notes:Table 1: How Victims' Information is Misused (Pg 11)
Table 2: Domestic Interest in Two-Factor Authentication Programs (Pg 18)
Table 3: International Interest in Two-Factor Authentication Programs (Pg 19)
-
Pages in Document:29
-
Dataset Download URL:
-
Format:
-
Release Date:06/17/2005
-
Agencies Involved:Federal Deposit Insurance Corporation (FDIC);Federal Trade Commission (FTC);
-
Law Involved:Gramm-Leach-Bliley Act (GLBA)
-
Source:FDIC Website
-
Main Document Checksum:
-
Download URL:
-
File Type: