Skip Header
U.S. flag

An official website of the United States government

Putting an End to Account-Hijacking Identity Theft Study Supplement

Previous | Table of Contents | Next

Table of Contents


Part 1: Public Comments and the FDIC's Response to Them

Summary of Public Comments
The FDIC's Response to the Comments

Part 2: More-Recent Trends in Identity Theft

Size of the Problem
Manner of Perpetration
Indirect Costs
The Reaction of Banks
Layered Mitigation Approach
Consumer Acceptance of Stronger Authentication
Examples of Two-Factor Authentication

Part 3 :Technologies to Mitigate Account Hijacking

Internet Protocol Address (IPA) Location and Geo-Location
Mutual Authentication
Device Authentication
Non-Hardware-Based One-Time-Password Scratch Card
Trusted Platform Module (TPM) Chip
User-Based Software to Detect Phishing and Fraudulent Web Sites
Out-of-Band Authentication

Part 4: Findings