This is the third of our modules on card payment fraud. In this module we discuss Mobile Authentication & Verification. This module includes four groups of techniques each with several sub-groups.
The four groups are:
1. Consumer Verification. This group covers the different techniques used to verify the consumer, for example passwords.
2. Device Authentication – in addition to verifying the consumer, the device needs to be authenticated to ensure the transaction is a genuine transaction. Different techniques used to authenticate the device used by the consumer are described.
3. Risk-Based Authentication is used to identify the consumer and the device used.
4. Analytics and Familiarity Signals – in this group techniques that are used are described. These techniques are generally based on the algorithms used and includes:
At the end of this course you will be better informed on what the threats are and which tools are available to mitigate and stop fraudulent activities for online payment fraud. You will also be able to make decisions on how to use these techniques on an informed basis.