Security & Fraud Prevention Glossary
Comprehensive guide to cybersecurity, fraud prevention, and security terminology
Found 83 terms
Account Takeover (ATO)
When cybercriminals gain unauthorized access to user accounts through stolen credentials, allowing them to commit fraud or theft.
Adversarial AI
AI designed to find and exploit weaknesses in other AI systems or security measures.
AI Hallucination Exploitation
Exploiting AI's tendency to generate false information to spread misinformation or commit fraud.
AI-Generated Phishing
Sophisticated phishing emails created by AI that perfectly mimic writing styles and include personalized details scraped from social media.
APT (Advanced Persistent Threat)
A stealthy, continuous hacking process often orchestrated by nation-states or sophisticated groups targeting specific organizations for espionage or data theft.
Artificial Intelligence (AI) Security
The use of AI and machine learning to detect, prevent, and respond to cyber threats in real-time by analyzing patterns and anomalies.
BEC (Business Email Compromise)
A sophisticated scam targeting businesses where criminals impersonate executives or trusted partners to trick employees into transferring funds or sensitive data.
Biometrics
Physical or behavioral human characteristics used for digital identification, including fingerprints, facial recognition, and voice patterns.
Blockchain
A distributed, immutable ledger technology that records transactions across multiple computers, ensuring transparency and security.
Botnet
A network of compromised computers controlled remotely by cybercriminals, often used for DDoS attacks, spam, or cryptocurrency mining.
CCSP (Certified Cloud Security Professional)
Certification for IT and security professionals with expertise in cloud security architecture, design, operations, and service orchestration.
CEH (Certified Ethical Hacker)
Certification that validates skills in identifying vulnerabilities and weaknesses in systems using the same tools as malicious hackers.
CEO Fraud
A type of BEC where attackers impersonate company executives to authorize fraudulent wire transfers or request sensitive information from employees.
Charity Fraud
Fake charities exploit disasters or emotional causes to steal donations meant for legitimate causes.
CISA (Certified Information Systems Auditor)
Globally recognized certification for professionals who audit, control, monitor and assess information technology and business systems.
CISO (Chief Information Security Officer)
Executive-level position responsible for establishing and maintaining enterprise vision, strategy, and security programs.
CISSP (Certified Information Systems Security Professional)
Advanced cybersecurity certification for experienced security professionals, covering eight domains of security knowledge.
Communication Spoofing
AI-powered impersonation of legitimate communications including emails, messages, and video calls to deceive victims.
Compliance Officer
Professional ensuring organization adheres to legal standards and internal policies related to information security.
CompTIA Security+
Entry-level cybersecurity certification covering foundational principles for network security and risk management.