VISIT LIBRARY SPONSOR A BOOK HOW IT WORKS NEWSLETTER FEEDBACK

Strengthening Application Security with Identity Fraud Prevention Systems

by Ken Hess

SYNOPSIS

Can having a friendly conversation in a public place make you or your business a target for identity fraud?  By inadvertently revealing personal information in such settings, anyone can open the door for identity theft, especially when standard knowledge-based authentication challenges and responses follow a set of "canned" replies to simple questions: your mother's maiden name, your first pet's name, your first car.  In this new Essential Series entitled Strengthening Application Security with Identity Fraud Prevention Systems, IT expert and author Ken Hess shows you how to protect your clients from identity theft using new methods of verification and authentication.  You will learn how to overcome regulatory compliance concerns surrounding knowledge-based authentication and verification and determine whether your current (or proposed) identity fraud prevention system will scale to meet future risks.


CHAPTER PREVIEWS

Article 1: Incorporating Identity Verification and Knowledge-Based Authentication into Your Applications

What are the implications of employing non-user-generated elements in an application? Data points not generated by the user are considered to be more secure because they don't depend on user input or a set of standard questions. Author Ken Hess reveals what is required to integrate these non-user-generated elements into applications in such a way that they are transparent to the end user.


Article 2: Overcoming the Regulatory, Security, and Compliance Concerns of Knowledge-based Authentication

Massive security breaches of credit card information and user data have become an almost daily occurrence. Thus, data security is a major concern for end users, customers, and data suppliers. In this second article, author Ken Hess reveals the many varied risks of knowledge-based authentication, and how to mitigate them.


Article 3: The Evolution of Identity Verification and Authentication from Static to Data-Driven Questions

Is your current authentication and verification solution scalable? Is it future-proof? As more applications migrate to cloud-based providers and are extended to mobile users, more security issues are bound to arise. In the last article of this series, author Ken Hess offers insight into how the threats of identity fraud are evolving with this migration to cloud and mobile devices, and how data providers must improve fraud prevention techniques to prevent these new threats from affecting their clients.