Putting an End to Account-Hijacking Identity Theft Study Supplement
Previous | Table of Contents | Next
Table of Contents
Part 1: Public Comments and the FDIC's Response to Them
Summary of Public Comments
The FDIC's Response to the Comments
Part 2: More-Recent Trends in Identity Theft
Size of the Problem
Manner of Perpetration
Indirect Costs
The Reaction of Banks
Layered Mitigation Approach
Consumer Acceptance of Stronger Authentication
Examples of Two-Factor Authentication
Part 3 :Technologies to Mitigate Account Hijacking
Internet Protocol Address (IPA) Location and Geo-Location
Mutual Authentication
Device Authentication
Non-Hardware-Based One-Time-Password Scratch Card
Trusted Platform Module (TPM) Chip
User-Based Software to Detect Phishing and Fraudulent Web Sites
Out-of-Band Authentication