Loading...

Knowledge Based Authentication (KBA) best practices, Part 2

Published: December 7, 2009 by Andrew Gulledge

–by Andrew Gulledge

Where does Knowledge Based Authenticationfit into my decisioning strategy?

Knowledge Based Authentication can fit into various parts of your authentication process. Some folks choose to put every consumer through KBA, while others only send their riskier transactions through the out-of-wallet questions. Some people useKnowledge Based Authenticationto feed a manual review process, while others use a KBA failure as a hard-decline. Uses for KBA are as sundry and varied as the questions themselves.

Decision Matrix– As discussed by prior bloggers, a well-engineered fraud score can provide considerable lift to any fraud risk strategy. When possible, it is a good idea to combine both score and questions into the decisioning process. This can be done with a matrixed approach—where you are more lenient on the questions if the applicant has a good fraud score, and more lenient on the score if the applicant did well on the questions. In a decision matrix, a set decision code is placed within various cells, based on fraud risk.

Decision Overrides– These provide a nice complement to your standard fraud decisioning strategy. Different fraud solution vendors provide different indicators or flagswith which decisioning rules can be created. For example, you might decide to fail a consumer who provides a social security number that is recorded as deceased. These rules can help to provide additional lift to the standard decisioning strategy, whether it is in addition to KnowledgeBased Authenticationquestions alone, questions and score, etc. The overrides can be along the lines of both auto-pass and auto-fail.

Related Posts

It’s critical for credit unions to understand the specific threats presented by life online and be prepared with a fraud detection and prevention plan

Published: April 13, 2021 by Alison Kray

Our worldwide survey explores the connection between recognition, fraud prevention and customer experience for our 2021 Global Identity and Fraud Report.

Published: April 8, 2021 by Alison Kray

The sharp uptick in fraud made it clear that banks, credit unions, and fintechs need to invest in a strategy that utilizes identity layers.

Published: March 30, 2021 by Alison Kray

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image