Shareholder Authentication (published 2015) Table of Contents 5 Shareholder Authentication 5 Table of Contents Table of Contents Table of Contents Introduction Universe of Transactions Nature of Participants in Shareholder Transactions Types of Shareholder Transactions Means of Transmission of Transaction Requests Authentication In Theory Principles of Authentication The First Authentication Factor: What You Know The Second Authentication Factor: What You Have The Third Authentication Factor: What You Are Multi-Factor Authentication Non-Traditional Authentication Factors Mutual Authentication Positive and Negative Authentication Factors Limitations of Authentication Limitations of Authentication Measures in Common Use Limitations of Authentication Measures Generally Authentication in Practice Technological Solutions Shareholder Knowledge Hardware and Software Tokens Biometrics Behavioral Patterns Protection of Authenticated Sessions Authentication of Devices Authentication of Transactions Authentication of Fund Groups (Mutual Authentication) Operational Initiatives Overall Threat Environment Risks Associated with Authentication Systems Risks Associated with Particular Transactions Potential Legal Consequences of Transactional Fraud Limiting Potential for Damage from Fraudulent Transactions Protection of Online Transaction Systems Educational Efforts Employee Training and Awareness Shareholder Awareness Insurance Glossary Further Reading Table of ContentsTable of Contents Introduction Universe of Transactions Nature of Participants in Shareholder Transactions Types of Shareholder Transactions Means of Transmission of Transaction Requests Authentication In Theory Principles of Authentication The First Authentication Factor: What You Know The Second Authentication Factor: What You Have The Third Authentication Factor: What You Are Multi-Factor Authentication Non-Traditional Authentication Factors Mutual Authentication Positive and Negative Authentication Factors Limitations of Authentication Limitations of Authentication Measures in Common Use Limitations of Authentication Measures Generally Authentication in Practice Technological Solutions Shareholder Knowledge Hardware and Software Tokens Biometrics Behavioral Patterns Protection of Authenticated Sessions Authentication of Devices Authentication of Transactions Authentication of Fund Groups (Mutual Authentication) Operational Initiatives Overall Threat Environment Risks Associated with Authentication Systems Risks Associated with Particular Transactions Potential Legal Consequences of Transactional Fraud Limiting Potential for Damage from Fraudulent Transactions Protection of Online Transaction Systems Educational Efforts Employee Training and Awareness Shareholder Awareness Insurance Glossary Further Reading