We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNathan O'Donnell
Modified over 3 years ago
© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010
© 2010 IBM Corporation Governments leverage many forms of information… …to establish ones identity footprint Public Records Commercial Information Biometrics Other Government IDs
© 2010 IBM Corporation But each step of the identity process can be exploited… Proofing documents can be fraudulent or fraudulently obtained Commercial evidence of identity – utility bills, credit cards, bank statements – speak to ability to pay, not identity Biometrics dont work for every person/application and some can be spoofed … resulting in identities that cannot be trusted Knowledge-based authentication: possession of a key or correct information may be problematic More secure identity documents may decrease vigilance and increase risk
© 2010 IBM Corporation A strategy for establishing greater trust in identities Start with solutions that consider the importance/value/risk of each identity and transaction Implement identity as a brokered service – tap into ID data where it resides rather than assembling a massive database of sensitive personal data Better use what already exists: clean up and leverage existing data Constantly monitor, assess and risk score the accuracy/integrity of data sources Conduct thorough and continuous vetting of every enrollee & user Obtain, manage and regularly update user consent Exceptions will occur! Solutions must handle them expeditiously to avoid security vulnerabilities
© 2010 IBM Corporation Sally checks in at airport using her government ID A Day in the Life of a Trusted Identity User Sally is off to a business meeting with a client in another city Sally stops at an ATM to reload her bank card Sally zips thru airport security via the fast-path lane At destination Sally takes subway using her bank card Sally has lunch at a local deli, pays with her employee ID Sally uses her bank card to access her hotel room Sally stops by a local office after client meeting Sally unlocks and starts the car with her fingerprint key fob Sally checks in for her return flight using her government ID Sally auto-registers in the clients visitor system with her employee ID Sally checks into hotel using her bank card and government ID After work Sally buys dinner with her bank card Sally leaves her house, locking up with a swipe of her finger Sally authorizes stock sale with her mobile device Sally checks her eBay account using her mobile phone to pay via PayPal Sally accesses her corporate network using her employee ID Sally buys from a vending machine with her mobile phone
© 2010 IBM Corporation Questions/Comments? Denny Carlton: Dennis.Carlton@us.ibm.comDennis.Carlton@us.ibm.com
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Your Assets By Preventing Identity Theft 1.
Financial Institutions, Checking Accounts, and Credit Lesson 3.
Online and Mobile Banking. Online banking Online Banking Online banking is a fairly established practice in our internet-saturated world. Many people.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Final Exam Review.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Warm Up – Pick which bank you would like to deposit your money in. Give 2 reasons for picking the bank. CriteriaWells FargoA Plus FCUBank of America Savings.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
ATM with Biometric Technology
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
How to Manage Your Cash › Daily Cash Needs Lunch, movies, gas, or paying for other activities Carry cash Go to an ATM Credit Card Know pros.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Sample Check Register. Sample Blank Check Register.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
© 2017 SlidePlayer.com Inc. All rights reserved.