Info |
---|
Each Topic Area is managed by a designated topic area leader. Each core mechanism must tap into cross-cutting concerns topic areas as needed. |
“IDPV Core Mechanisms” Topic
...
Leader
...
Areas
“Cross-cutting Concerns” Topic Areas
Prevention Countermeasures | Dawid Jacobs |
Hacker motivations (social engineering), payloads, simulated humans, synthetic identity | Heather Vescent |
Phone/Voice
Chris LaBarbera
ID Proofing and Verification Systems
Andrew Hughes
“AI”
“AI” | James Monaghan |
“DG-Level Topic” Areas
Andrew Hughes | |
Glossaries & core concepts | Jay Meier |
Maxine Most | |
High-level DG Purpose/Motivations Messaging | DG Leaders |
Suggested topic area structure
<<Topic area>>
Describe what the topic area is and who uses it in the context of ID Proofing and Verification Systems (emphasis on “Remote”)
Describe how the mechanism/function works
Describe the kinds of attacks and threats the mechanism/function is vulnerable to today
Describe ‘indicators of compromise’ that are used to determine whether attacks are underway or have been successful
Describe the kinds of countermeasures or defences exist today
Describe how “AI” could accelerate attacks, or introduce new attacks
Describe how “AI” could degrade the mechanism/function
Describe how “AI” could improve the mechanism/function
Make a list of references to statistics, studies or reports that highlight scale, frequency, losses, impacts, etc