Digital identity: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
(Layout.) |
(Layout.) |
||
Line 45: | Line 45: | ||
==Other resource== | ==Other resource== | ||
*[https://edu.bankofengland.co.uk/minutes/2024/march/minutes-of-cbdc-academic-advisory-group-march-2024 Minutes of the UK CBDC Academic Advisory Group - March 2024] | *[https://edu.bankofengland.co.uk/minutes/2024/march/minutes-of-cbdc-academic-advisory-group-march-2024 Minutes of the UK Central Bank Digital Currency (CBDC) Academic Advisory Group - March 2024] | ||
[[Category:Financial_products_and_markets]] | [[Category:Financial_products_and_markets]] | ||
[[Category:The_business_context]] | [[Category:The_business_context]] |
Latest revision as of 10:18, 30 July 2024
1. Treasury - risk management - cyber security - individuals - banking - finance.
In the context of banking and financial transactions, a digital identity is a mechanism for an individual to prove their identity, without presenting physical documents.
- Risks and opportunities of Central Bank Digital Currencies (CBDCs)
- "Professor Bill Buchanan OBE presented on the risks and opportunities of CBDCs from a technology perspective.
- He addressed the role of AI, quantum, cybersecurity, and programmable payments.
- Members discussed how different forms of technology such as distributed ledger technology or digital identities may change the role of banking and finance."
- UK CBDC Academic Advisory Group - March 2024.
2. Treasury - risk management - cyber threat - cyber security - individuals - banking - finance.
The totality of information about an individual's online activities, including the potential for criminals to impersonate the individual if the information is compromised.
See also
- Advanced Persistent Threat
- Artificial intelligence (AI)
- Authentication
- Central bank digital currency (CBDC)
- Council to Secure the Digital Economy
- Credential compromise
- Cyber security
- Cyber security: protecting your business and your clients
- Cyber threat
- Cybercrime
- Cybercrime – A Threat And An Opportunity
- Digital footprint
- Distributed ledger
- Malware
- Quantum
- Ransomware
- Risk management
- Strong Customer Authentication
- Treasury
- Two-factor authentication
- Whaling