Please enter the following information in order to view or download this document.
Name:
Email Address:
Position:
Please select one
Independent Director
Fund Management
Outside Counsel
Risk Manager
Broker
Other
Please Describe:
Cancel
Download
Contact Us
Search form
Search
About ICI Mutual
Products & Services
Resources
Fast Facts
Board of Directors
Management & Staff
Financial Strength
Annual Report
Coverages
Underwriting
Claims Handling
Risk Management
ICI Mutual Insurance Brokers, Inc.
Risk Management Studies
Claims Trends
Litigation Notebook
Risk Management Conference
Peer Reports
Presenting Insurance Options to the Board
Presentations
Shareholder Authentication
Table of Contents
Table of Contents
Table of Contents
Introduction
Universe of Transactions
Nature of Participants in Shareholder Transactions
Types of Shareholder Transactions
Means of Transmission of Transaction Requests
Authentication In Theory
Principles of Authentication
The First Authentication Factor: What You Know
The Second Authentication Factor: What You Have
The Third Authentication Factor: What You Are
Multi-Factor Authentication
Non-Traditional Authentication Factors
Mutual Authentication
Positive and Negative Authentication Factors
Limitations of Authentication
Limitations of Authentication Measures in Common Use
Limitations of Authentication Measures Generally
Authentication In Practice
Technological Solutions
Shareholder Knowledge
Hardware and Software Tokens
Biometrics
Behavioral Patterns
Protection of Authenticated Sessions
Authentication of Devices
Authentication of Transactions
Authentication of Fund Groups (Mutual Authentication)
Operational Initiatives
Overall Threat Environment
Risks Associated with Authentication Systems
Risks Associated with Particular Transactions
Potential Legal Consequences of Transactional Fraud
Limiting Potential for Damage from Fraudulent Transactions
Protection of Online Transaction Systems
Educational Efforts
Employee Training and Awareness
Shareholder Awareness
Insurance
Glossary
Further Reading
Table of Contents
Introduction
Universe of Transactions
Nature of Participants in Shareholder Transactions
Types of Shareholder Transactions
Means of Transmission of Transaction Requests
Authentication In Theory
Principles of Authentication
The First Authentication Factor: What You Know
The Second Authentication Factor: What You Have
The Third Authentication Factor: What You Are
Multi-Factor Authentication
Non-Traditional Authentication Factors
Mutual Authentication
Positive and Negative Authentication Factors
Limitations of Authentication
Limitations of Authentication Measures in Common Use
Limitations of Authentication Measures Generally
Authentication In Practice
Technological Solutions
Shareholder Knowledge
Hardware and Software Tokens
Biometrics
Behavioral Patterns
Protection of Authenticated Sessions
Authentication of Devices
Authentication of Transactions
Authentication of Fund Groups (Mutual Authentication)
Operational Initiatives
Overall Threat Environment
Risks Associated with Authentication Systems
Risks Associated with Particular Transactions
Potential Legal Consequences of Transactional Fraud
Limiting Potential for Damage from Fraudulent Transactions
Protection of Online Transaction Systems
Educational Efforts
Employee Training and Awareness
Shareholder Awareness
Insurance
Glossary
Further Reading