Fraud

123456789101112131415161718192021222324252627
Across
  1. 4. A federal law that was signed into effect in October 2001 to strengthen national security.
  2. 8. An investment fraud that works by paying existing investors with the funds that are collected from new investors.
  3. 9. A fraud tactic where bad actors impersonate legitimate people/businesses via SMS/text message to trick unsuspecting victims into sharing personal information (passwords, PII, credit card numbers, etc.).
  4. 11. Authentication methodology that requires users to provide multiple pieces of authentication evidence when logging into a system.
  5. 12. Any unauthorized access or entry into a secured system or resource, whether intentional or unintentional, in which sensitive data is exposed or stolen.
  6. 14. A fraud tactic where bad actors impersonate legitimate people/businesses via email to trick unsuspecting victims into sharing personal information (account number, phone number, password, credit card number, etc.).
  7. 15. A fraudster steals another person's identity for personal gain.
  8. 20. Malicious software that is used to infiltrate a computer system without the user's knowledge or permission.
  9. 21. A cyber attack technique where an attacker impersonates another user or computer system in a network or a communications system.
  10. 22. involves concealing the origin of funds acquired through illegal or criminal activity by attributing them to a seemingly legitimate source via layered transfers.
  11. 24. A process that requires businesses to verify the identity of a customer before doing business with them.
  12. 25. Illegally taking money entrusted to an individual or organization for personal use.
  13. 26. A specialized team of investigators that investigate complex or sensitive matters.
  14. 27. A form of fraud where people create false identities online, often with the intent to deceive others.
Down
  1. 1. Any data which can be used to identify an individual. It includes sensitive information such as name, address, Social Security Number, driver’s license information, financial data, usernames and passwords, healthcare information and more.
  2. 2. The practice of ensuring the safety of confidential information and assets, as well as the security of mobile devices and networks, when accessing the internet or connecting to networks through mobile devices.
  3. 3. A fraudster impersonates a legitimate party and reaches out to a target through an everyday social interaction.
  4. 5. a type of fraud that occurs when an attacker gains access to and takes control of an account that belongs to another person.
  5. 6. Malicious software that is used by cyber criminals, usually to illegally gain access to a computer system or encode and hold important data hostage, in exchange for a ransom.
  6. 7. Fraudulent investment programs that require participants to contribute money in order to join, with promised monetary rewards for recruiting additional participants.
  7. 10. Individuals who intentionally commit fraud against financial institutions, businesses, or consumers.
  8. 13. A financial institution responsible for safeguarding a customer’s assets.
  9. 16. Malicious software that is used to secretly collect a user's data without their knowledge or consent.
  10. 17. An authentication credential used to protect computer systems, applications, networks, and other confidential information.
  11. 18. Malicious software that appears to be legitimate but performs a hidden malicious activity without the user's knowledge.
  12. 19. The process of ensuring that organizations, individuals and other entities comply with laws, regulations, rules, codes of practice and industry standards.
  13. 23. Videos or audio recordings that have been manipulated to make it appear as if someone is saying or doing something that they did not actually say or do.