Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Each Topic Area is managed by a designated topic area leader.

Each core mechanism must tap into cross-cutting concerns topic areas as needed.

“IDPV Core Mechanisms” Topic Areas

Content Topic Areas

Info

Please reach out to topic area leader if you wish to participate/contribute/learn there - use the mailing list or at a meeting

Note

NB: Must include citations to sources! References with no citations cannot be used!

{BOLD = Leader; Bulleted = Contributor}

...

Core concepts topics

A.1

Core concepts: A.1 Glossaries & core concepts

Jay Meier

A.2

Core concepts: A.2 ID Proofing and Verification Systems - Overall

Andrew Hughes

Phone/Voice

Chris LaBarbera

“Cross-cutting Concerns” Topic Areas

Prevention Countermeasures

Dawid Jacobs

Hacker motivations (social engineering), payloads, simulated humans, synthetic identity

Heather Vescent

“AI”

James Monaghan

“DG-Level Topic” Areas

Mind maps

Andrew Hughes

Glossaries & core concepts

Jay Meier

Audiences and Segmentation

Maxine Most

High-level DG Purpose/Motivations Messaging

DG Leaders

Suggested topic area structure

<<Topic area>>

  • Describe what the topic area is and who uses it in the context of ID Proofing and Verification Systems (emphasis on “Remote”)

  • Describe how the mechanism/function works

  • Describe the kinds of attacks and threats the mechanism/function is vulnerable to today

    • Describe ‘indicators of compromise’ that are used to determine whether attacks are underway or have been successful

  • Describe the kinds of countermeasures or defences exist today

  • Describe how “AI” could accelerate attacks, or introduce new attacks

  • Describe how “AI” could degrade the mechanism/function

  • Describe how “AI” could improve the mechanism/function

, Jay Meier, Isha Chhatwal, Julian White, Mike Magrath

A.3

Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems

James Monaghan

A.4

Core concepts: A.4 Simulated humans and synthetic identity - context

Incorporate intent into applicable sections. Sections will be eliminated from scope to be deservant of their own domain.

Heather Vescent *

Attacks & Threats topics

B.1

B.1 Current threats and attack vectors

What are the current Attack vectors & threats?

Jay Meier

  • Denny Prvu

  • Max Most

  • Sal D’Agostino

  • Sean Lanzner

B.2

B.2 Hacker motivations

What are hacker motivations (social engineering), payloads… they want to steal something or profit from it or break something.

What is vulnerable.

Target audience consideration for those not SME’s

Incorporate intent into applicable sections. Sections will be eliminated from scope to be deservant of their own domain.

Heather Vescent

Potential

B.3

B.3 Phone/Voice vector attacks and defences

How are Phone/Voice attacked and defended?

Chris LaBarbera

B.4

B.4 A collection of real world incidents

Some examples of Attack scenarios & real world media stories

  • Jay Meier

  • Denny Prvu

  • Max Most

  • Mike Magrath

Prevention, Defences, Countermeasures topics

C.1

C.1 Prevention and Countermeasures

What are current Prevention & Countermeasures?

Dawid Jacobs

Emerging capabilities for detection, defence, mitigation topics

D.1

What do Emerging defences and mitigation strategies look like and how might they evolve?

E.1

E.1 A Collection of regulatory materials

What regulations and governmental discussion forums are starting to form? (Collect and Collate) - North American Primary

Denny Prvu

  • Peter Davis

  • Mike Magrath

GOALS for content areas

  1. Build up a small knowledge base or content collection related to the content area - use your folder in the wiki.

  2. Write up a set of factual statements that capture the essence of the content area. Do not use jargon. Aim to provide an intelligent (but unexposed to the topic) reader the core facts of the content area.

“DG-Level Topic” Areas