Difference between revisions of "Identity Pathology"

From MgmtWiki
Jump to: navigation, search
(Problems)
(Context)
Line 4: Line 4:
  
 
==Context==
 
==Context==
[[Bayesian Identity Proofing]] provides the means for a collection of authentication and verification steps to be validated.
+
 
 +
User private data is required for release of web resources. Minimizing the amount of data released or its misuse after release is the object of this effort to collect a list of the various attacks and their mitigations.
  
 
==Problems==
 
==Problems==

Revision as of 10:12, 20 June 2018

Full Title or Meme

A list of various ways in which identity information can be misused or misappropriated on the internet.

Context

User private data is required for release of web resources. Minimizing the amount of data released or its misuse after release is the object of this effort to collect a list of the various attacks and their mitigations.

Problems

  • Attacks at the user device or user agent.
  • Attacks on the transmission of user private data.
  • Spoofing attacks.
  • Misuse of user private data.

Solutions

References