Security & Fraud Prevention Glossary

Comprehensive guide to cybersecurity, fraud prevention, and security terminology

Found 83 terms

Account Takeover (ATO)

Fraud Types

When cybercriminals gain unauthorized access to user accounts through stolen credentials, allowing them to commit fraud or theft.

Related:

Adversarial AI

AI Threats

AI designed to find and exploit weaknesses in other AI systems or security measures.

Related:

AI Hallucination Exploitation

AI Threats

Exploiting AI's tendency to generate false information to spread misinformation or commit fraud.

Related:

AI-Generated Phishing

AI Threats

Sophisticated phishing emails created by AI that perfectly mimic writing styles and include personalized details scraped from social media.

Related:

APT (Advanced Persistent Threat)

Cybercrime

A stealthy, continuous hacking process often orchestrated by nation-states or sophisticated groups targeting specific organizations for espionage or data theft.

Related:

Artificial Intelligence (AI) Security

Technologies

The use of AI and machine learning to detect, prevent, and respond to cyber threats in real-time by analyzing patterns and anomalies.

Related:

BEC (Business Email Compromise)

Fraud Types

A sophisticated scam targeting businesses where criminals impersonate executives or trusted partners to trick employees into transferring funds or sensitive data.

Related:

Biometrics

Technologies

Physical or behavioral human characteristics used for digital identification, including fingerprints, facial recognition, and voice patterns.

Related:

Blockchain

Technologies

A distributed, immutable ledger technology that records transactions across multiple computers, ensuring transparency and security.

Related:

Botnet

Cybercrime

A network of compromised computers controlled remotely by cybercriminals, often used for DDoS attacks, spam, or cryptocurrency mining.

Related:

CCSP (Certified Cloud Security Professional)

Certifications

Certification for IT and security professionals with expertise in cloud security architecture, design, operations, and service orchestration.

Related:

CEH (Certified Ethical Hacker)

Certifications

Certification that validates skills in identifying vulnerabilities and weaknesses in systems using the same tools as malicious hackers.

Related:

CEO Fraud

Fraud Types

A type of BEC where attackers impersonate company executives to authorize fraudulent wire transfers or request sensitive information from employees.

Related:

Charity Fraud

Fraud Types

Fake charities exploit disasters or emotional causes to steal donations meant for legitimate causes.

Related:

CISA (Certified Information Systems Auditor)

Certifications

Globally recognized certification for professionals who audit, control, monitor and assess information technology and business systems.

Related:

CISO (Chief Information Security Officer)

Departments

Executive-level position responsible for establishing and maintaining enterprise vision, strategy, and security programs.

Related:

CISSP (Certified Information Systems Security Professional)

Certifications

Advanced cybersecurity certification for experienced security professionals, covering eight domains of security knowledge.

Related:

Communication Spoofing

AI Threats

AI-powered impersonation of legitimate communications including emails, messages, and video calls to deceive victims.

Related:

Compliance Officer

Departments

Professional ensuring organization adheres to legal standards and internal policies related to information security.

Related:

CompTIA Security+

Certifications

Entry-level cybersecurity certification covering foundational principles for network security and risk management.

Related: