Financial Transactions and Fraud Schemes Part 2 Flashcards
What type of malware is most commonly associated with identity theft, and what does it do?
Spyware, which collects and reports information about a computer user without their knowledge or consent.
Why should individuals avoid using public Wi-Fi networks for sensitive activities?
Public Wi-Fi networks are often unsecured and can be easily exploited by fraudsters to intercept sensitive information.
What is a data breach, and how is stolen information typically used?
A data breach occurs when personal information of a company’s customers is compromised, and the stolen information is often sold on illegal trading websites.
Who are considered malicious insiders, and what role do they play in identity theft?
Malicious insiders include employees, business associates, relatives, and friends who have access to sensitive information and may steal it for their own identity theft schemes or sell it to criminals.
What are the benefits of using biometric authentication?
Biometric authentication, such as fingerprints or voice recognition, provides a higher level of security as it is unique to the individual and difficult to replicate.
What should individuals do with their physical mail to prevent identity theft?
Secure physical mailboxes with a lock, check mail regularly, instruct the post office to suspend mail during vacations, and shred all sensitive documents.
Why is it important not to reuse passwords across different websites or accounts?
Reusing passwords increases the risk of multiple accounts being compromised if one password is stolen.
What should businesses do with personal information once it is no longer necessary?
Businesses should not retain personal information longer than necessary and should properly dispose of it according to an information-handling policy.
Why is encryption important for businesses handling personal information?
Encryption protects personal information stored by the company or sent to third parties, ensuring that unauthorized parties cannot access the data even if it is intercepted.
What steps should businesses take to secure their physical and electronic records?
Businesses should use locks, access codes, keep physical documents in locked rooms or cabinets, and secure all computer networks with strong cybersecurity measures.
What is the first action a victim of identity theft should take?
File a police report with local law enforcement authorities and keep a copy of the report.
How can businesses restrict employees’ access to sensitive information?
By limiting access to only those employees who need the information to perform their jobs and using network-security tools to monitor access.
Why should victims of identity theft contact credit reporting agencies?
To have a security alert or freeze placed on credit reports, preventing further unauthorized activity.
What should victims do with their bank and credit card accounts after discovering identity theft?
Report unauthorized charges, cancel affected cards, get replacements, and change account numbers or close affected accounts.
What actions should be taken regarding unauthorized checks?
Put a stop payment on all lost or stolen checks and report the issue to the bank.
What is embezzlement, and how does it differ from other forms of theft?
Embezzlement is the wrongful conversion of entrusted property, where the perpetrator had lawful possession initially.
Describe false accounting entry schemes in financial institution fraud.
False accounting entries involve employees debiting the general ledger to credit their own accounts or cover up theft from customer accounts.
Explain how suspense account schemes are used in financial institution fraud.
Suspense account schemes involve fictitious entries to temporarily hold funds, later cleared by increasingly large fictitious debits, akin to a lapping scheme.
How do unauthorized withdrawals differ from other embezzlement schemes?
Unauthorized withdrawals involve employees directly taking funds from customer accounts without attempting to conceal the theft in the bank’s records.
What are some types of suspense accounts typically used in financial institutions?
Examples include loans in process, interdepartmental transfers, currency in transit, refunds on insufficient funds charges, and due from banks.
Discuss the risk associated with false or unauthorized transfers from internal accounts in financial institutions.
This involves substituting personal accounts for internal accounts in transactions, potentially leading to financial losses for the institution.
What characterizes unauthorized disbursement of funds to outsiders in financial institution fraud?
Employees abuse their authority to approve fraudulent instruments or disburse funds without proper authorization, often for personal gain.
Explain the concept of paying personal expenses from bank funds in financial institution fraud.
This involves using bank resources to pay personal bills, often disguised as legitimate bank expenses.
Describe the theft of physical property as a form of embezzlement in financial institutions.
Employees or contractors steal office equipment, building materials, or furnishings from the bank premises.