Health Information Exchange (HIE)







People and Operational Controls as Attack Vectors

By Kyle Neuman – Part 4 of 5. In the previous two blog posts of this series on identity credentials, we discussed identity proofing and authentication. This blog post will focus on an attack of the operational controls of an identity system. This is the third and final attack that we’ll consider for Risk Category 2, nefarious impersonation.