We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNathan O'Donnell
Modified over 3 years ago
© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010
© 2010 IBM Corporation Governments leverage many forms of information… …to establish ones identity footprint Public Records Commercial Information Biometrics Other Government IDs
© 2010 IBM Corporation But each step of the identity process can be exploited… Proofing documents can be fraudulent or fraudulently obtained Commercial evidence of identity – utility bills, credit cards, bank statements – speak to ability to pay, not identity Biometrics dont work for every person/application and some can be spoofed … resulting in identities that cannot be trusted Knowledge-based authentication: possession of a key or correct information may be problematic More secure identity documents may decrease vigilance and increase risk
© 2010 IBM Corporation A strategy for establishing greater trust in identities Start with solutions that consider the importance/value/risk of each identity and transaction Implement identity as a brokered service – tap into ID data where it resides rather than assembling a massive database of sensitive personal data Better use what already exists: clean up and leverage existing data Constantly monitor, assess and risk score the accuracy/integrity of data sources Conduct thorough and continuous vetting of every enrollee & user Obtain, manage and regularly update user consent Exceptions will occur! Solutions must handle them expeditiously to avoid security vulnerabilities
© 2010 IBM Corporation Sally checks in at airport using her government ID A Day in the Life of a Trusted Identity User Sally is off to a business meeting with a client in another city Sally stops at an ATM to reload her bank card Sally zips thru airport security via the fast-path lane At destination Sally takes subway using her bank card Sally has lunch at a local deli, pays with her employee ID Sally uses her bank card to access her hotel room Sally stops by a local office after client meeting Sally unlocks and starts the car with her fingerprint key fob Sally checks in for her return flight using her government ID Sally auto-registers in the clients visitor system with her employee ID Sally checks into hotel using her bank card and government ID After work Sally buys dinner with her bank card Sally leaves her house, locking up with a swipe of her finger Sally authorizes stock sale with her mobile device Sally checks her eBay account using her mobile phone to pay via PayPal Sally accesses her corporate network using her employee ID Sally buys from a vending machine with her mobile phone
© 2010 IBM Corporation Questions/Comments? Denny Carlton: Dennis.Carlton@us.ibm.comDennis.Carlton@us.ibm.com
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Your Assets By Preventing Identity Theft 1.
Financial Institutions, Checking Accounts, and Credit Lesson 3.
Online and Mobile Banking. Online banking Online Banking Online banking is a fairly established practice in our internet-saturated world. Many people.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Final Exam Review.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Warm Up – Pick which bank you would like to deposit your money in. Give 2 reasons for picking the bank. CriteriaWells FargoA Plus FCUBank of America Savings.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
ATM with Biometric Technology
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
How to Manage Your Cash › Daily Cash Needs Lunch, movies, gas, or paying for other activities Carry cash Go to an ATM Credit Card Know pros.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Sample Check Register. Sample Blank Check Register.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Information Security Sharon Welna Information Security Officer.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Metropolitan Transportation Authority New Fare Payment Systems Update Presentation to Capital Program Oversight Committee May 23, 2011.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Transaction Processing System Business Transactions are certain events that occur routinely in a business firm. A transaction is a set of activities.
It could be you! Or is it? Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Credit and Credit Cards
The Journal and Source Documents
4.01 Accounting and Finance. What is Accounting? Method of reporting financial activity of a business Financial transactions recorded in an orderly fashion.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012, Region One Education Service Center P-CARD BEST PRACTICES AND COMMON PITFALLS Frances Guzman Deputy Director for Business Operations and Finance.
WEEK 1 INTRODUCTION Interpret Financial Information.
Mobile payment and Sonera. Finland as a Mobile Commerce Lab Mobile penetration 84% - no handset subsidy Hardly at all prepayment subscribers Premium rate.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
Money Management Strategy
Financial Education Jr. Chapter 2013 SHPE Foundation.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Building Bucks Basic Financial Services. Financial Institutions 3 Main Types – Banks – Credit Unions – Savings and Loan Associations (S&L) Advantages.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
You. are at risk for the fastest growing crimes crime.
EFTPOS and credit card payments Rachel Garcia Line 4 Due:14 th November Business Admin Michael Barry.
Journal Question ► Why is it important for a company to focus on having excellent customer service? Give three examples.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
By: Monika Achury and Shuchita Singh
© 2017 SlidePlayer.com Inc. All rights reserved.