Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Each Topic Area is managed by a designated topic area leader.

Each core mechanism must tap into cross-cutting concerns topic areas as needed.

“IDPV Core Mechanisms” Topic

...

Leader

...

Areas

ID Proofing and Verification Systems - Overall

Andrew Hughes

Glossaries & core concepts

Jay Meier

Audiences and Segmentation

Maxine Most

Phone/Voice

Chris LaBarbera

“Cross-cutting Concerns” Topic Areas

Prevention Countermeasures

Dawid Jacobs

Hacker motivations (social engineering), payloads, simulated humans, synthetic identity

Heather Vescent

Phone/Voice

Chris LaBarbera

ID Proofing and Verification Systems

Andrew Hughes

“AI”

James Monaghan

“AI”

James Monaghan

“DG-Level Topic” Areas

Mind maps

Andrew Hughes

Glossaries & core concepts

Jay Meier

Audiences and Segmentation

Maxine Most

High-level DG Purpose/Motivations Messaging

DG Leaders

Suggested topic area structure

<<Topic area>>

  • Describe what the topic area is and who uses it in the context of ID Proofing and Verification Systems (emphasis on “Remote”)

  • Describe how the mechanism/function works

  • Describe the kinds of attacks and threats the mechanism/function is vulnerable to today

    • Describe ‘indicators of compromise’ that are used to determine whether attacks are underway or have been successful

  • Describe the kinds of countermeasures or defences exist today

  • Describe how “AI” could accelerate attacks, or introduce new attacks

  • Describe how “AI” could degrade the mechanism/function

  • Describe how “AI” could improve the mechanism/function

  • Make a list of references to statistics, studies or reports that highlight scale, frequency, losses, impacts, etc