Identity Verification Policy

There are several considerations to make when designing an identity verification system. One is evidence of the claimed identity, which in this case it can either be physical evidence or digital evidence. Physical evidence may entail an identity card or a passport, while digital evidence is information such as personal data. Those asking for the information will need to prove that the identity is theirs.

Another consideration is the validity of the identity. Wiley (2010) argues that hackers majorly capitalize on pretexting to impersonate people, even in physical cases. It can be avoided by counter-checking the person’s physical identity document to see whether it is forged or genuine. This involves looking at the name and date of birth to ensure that what they claim is true. For digital cases of identity, those asking for information, the policy should be designed to ensure that the cryptographic features confirm the identity. The information should also not have been edited. The attendees can ask for personal information about the person to ensure that they conform to those in the system. Security Through Education. (2014) shows that framing can be used to present information to the victims to derail their decision-making. How the claimant presents, the data should be counter-checked to detect any form of framing.

Don't use plagiarized sources. Get Your Custom Essay on
Identity Verification Policy
Just from $13/Page
Order Essay

Identity being claimed has existed over time? If new, then that is a red flag on the possibility of a forged identity. A history check can confirm whether the identity is for alive people since hackers can use the identities of dead people. If it is physical persons, have those people been in the organization over time, or are they new? If they are persons over the emails, b counter-check should be done on whether the same emails have been used before in the business interactions with the claimant. For text messages, the mobile phone number is counter-checked.Identity verification policy designs should also be done so that the identity belongs to the persons who are claiming to be theirs. This can be done to ensure that the person matches the photo in the document in physical and remote interactions. They must also match the biometric information being claimed, and also, they must be not wearing anything likely to hinder the identity verification.


and taste our undisputed quality.