
Contact Us
  • About ICI Mutual
    • Fast Facts
    • Board of Directors
    • Management & Staff
    • Financial Strength
    • Annual Report
  • Products & Services
    • Coverages
    • Underwriting
    • Claims Handling
    • Risk Management
    • ICI Mutual Insurance Brokers, Inc.
  • Resources
    • Risk Management Studies
    • Claims Trends
    • Litigation Notebook
    • Risk Management Conference
    • Speeches
    • Presenting Insurance Options to the Board
    • Presentations

Shareholder Authentication (published 2015)

Table of Contents 5 Shareholder Authentication 5 Table of Contents

Table of Contents

  • Table of Contents
  • Introduction
    • Universe of Transactions
      • Nature of Participants in Shareholder Transactions
      • Types of Shareholder Transactions
      • Means of Transmission of Transaction Requests
  • Authentication In Theory
    • Principles of Authentication
      • The First Authentication Factor: What You Know
      • The Second Authentication Factor: What You Have
      • The Third Authentication Factor: What You Are
      • Multi-Factor Authentication
      • Non-Traditional Authentication Factors
      • Mutual Authentication
      • Positive and Negative Authentication Factors
    • Limitations of Authentication
      • Limitations of Authentication Measures in Common Use
      • Limitations of Authentication Measures Generally
  • Authentication in Practice
    • Technological Solutions
      • Shareholder Knowledge
      • Hardware and Software Tokens
      • Biometrics
      • Behavioral Patterns
      • Protection of Authenticated Sessions
      • Authentication of Devices
      • Authentication of Transactions
      • Authentication of Fund Groups (Mutual Authentication)
    • Operational Initiatives
      • Overall Threat Environment
      • Risks Associated with Authentication Systems
      • Risks Associated with Particular Transactions
      • Potential Legal Consequences of Transactional Fraud
      • Limiting Potential for Damage from Fraudulent Transactions
      • Protection of Online Transaction Systems
    • Educational Efforts
      • Employee Training and Awareness
      • Shareholder Awareness
  • Insurance
  • Glossary
  • Further Reading

Table of Contents

  • Table of Contents
  • Introduction
    • Universe of Transactions
      • Nature of Participants in Shareholder Transactions
      • Types of Shareholder Transactions
      • Means of Transmission of Transaction Requests
  • Authentication In Theory
    • Principles of Authentication
      • The First Authentication Factor: What You Know
      • The Second Authentication Factor: What You Have
      • The Third Authentication Factor: What You Are
      • Multi-Factor Authentication
      • Non-Traditional Authentication Factors
      • Mutual Authentication
      • Positive and Negative Authentication Factors
    • Limitations of Authentication
      • Limitations of Authentication Measures in Common Use
      • Limitations of Authentication Measures Generally
  • Authentication in Practice
    • Technological Solutions
      • Shareholder Knowledge
      • Hardware and Software Tokens
      • Biometrics
      • Behavioral Patterns
      • Protection of Authenticated Sessions
      • Authentication of Devices
      • Authentication of Transactions
      • Authentication of Fund Groups (Mutual Authentication)
    • Operational Initiatives
      • Overall Threat Environment
      • Risks Associated with Authentication Systems
      • Risks Associated with Particular Transactions
      • Potential Legal Consequences of Transactional Fraud
      • Limiting Potential for Damage from Fraudulent Transactions
      • Protection of Online Transaction Systems
    • Educational Efforts
      • Employee Training and Awareness
      • Shareholder Awareness
  • Insurance
  • Glossary
  • Further Reading
© ICI Mutual Insurance Company, a Risk Retention Group. All Rights Reserved.
1401 H Street NW, Suite 1150 Washington, DC 20005 | 800.643.4246
  • Terms of Use
  • Home
  • Contact Us