Fraud

1234567891011121314151617181920212223242526
Across
  1. 4. A form of fraud where people create false identities online, often with the intent to deceive others.
  2. 6. A process that requires businesses to verify the identity of a customer before doing business with them.
  3. 7. A cyber attack technique where an attacker impersonates another user or computer system in a network or a communications system.
  4. 8. A type of fraud that occurs when an attacker gains access to and takes control of an account that belongs to another person.
  5. 11. Any unauthorized access or entry into a secured system or resource, whether intentional or unintentional, in which sensitive data is exposed or stolen.
  6. 13. The illegal misappropriation of funds or assets entrusted to an individual or organization.
  7. 16. Authentication methodology that requires users to provide multiple pieces of authentication evidence when logging into a system.
  8. 18. Malicious software that is used to secretly collect a user's data without their knowledge or consent.
  9. 19. A malicious software that is used to infiltrate a computer system without the user's knowledge or permission.
  10. 20. A person who commits fraud, especially in business or commercial dealings.
  11. 21. An investment fraud that works by paying existing investors with the funds that are collected from new investors.
  12. 23. Any data which can be used to identify an individual. It includes sensitive information such as name, address, Social Security Number, driver’s license information, financial data, usernames and passwords, healthcare information and more.
  13. 24. Fraudulent investment programs that require participants to contribute money in order to join, with promised monetary rewards for recruiting additional participants.
  14. 25. The practice of ensuring the safety of confidential information and assets, as well as the security of mobile devices and networks, when accessing the internet or connecting to networks through mobile devices.
  15. 26. A process of disguising illegal profits or funds obtained from criminal activities such as drug trafficking, corruption, terrorism, or other financial crimes.
Down
  1. 1. A financial institution responsible for safeguarding a customer’s assets.
  2. 2. An authentication credential used to protect computer systems, applications, networks, and other confidential information.
  3. 3. A type of malicious software that is used by cyber criminals, usually to illegally gain access to a computer system or encode and hold important data hostage, in exchange for a ransom.
  4. 5. A federal law that was signed into effect in October 2001 to strengthen national security.
  5. 9. The process of ensuring that organizations, individuals and other entities comply with laws, regulations, rules, codes of practice and industry standards.
  6. 10. The practice of acquiring someone else’s personal information and using it for financial gain.
  7. 12. A technology that relies on Artificial Intelligence (AI) to create false images, audio recordings and video recordings of individuals.
  8. 14. The use of tactics and methods to manipulate people into divulging sensitive information or performing actions that can be used to pave the way for a security breach or malicious activity.
  9. 15. A fraud tactic where bad actors impersonate legitimate people/businesses via SMS/text message to trick unsuspecting victims into sharing personal information (passwords, PII, credit card numbers, etc.).
  10. 17. A type of malicious software that appears to be legitimate but performs a hidden malicious activity without the user's knowledge.
  11. 22. A specialized team within an insurance company that focuses on detecting, investigating, and preventing insurance fraud.
  12. 23. A type of cyberattack that utilizes social engineering techniques to deceive victims into disclosing sensitive personal and financial information or performing tasks that allow the attacker access to a victim’s system.