Financial Transactions - Consumer Fraud Flashcards
What is a block hustle?
202
A scheme in which the purveyor sells imitation or stolen goods on the street
purveyor = Händler hustle = Hast, Hektik
What is an advance-fee swindle?
201
A swindle structured to obtain an illegal gain by falsely promising the delivery of a product or a service in exchange for an upfront fee.
Vorauskasse-Schwindel
What is an advertising scheme?
203
A scheme in which a fraudster sells ficticious advertising space, such as in a nonexistent magazine or telephone directory
Anderes Beispiel:
Firmeneinträge aufgrund von HR-Publikationen
What is a scavenger scheme?
204
A scheme in which a previously conned victim is targeted for an advance fee by a bogus company that claims to assist fraud victims in recovering stolen money
bogus = betrügerisch scavenger = Lumpensammler, Aasgeier, Müllsammler etc.
What is Affinity fraud?
205
Fraud that targets people who share social connection (e.g. religiouos groups, racial minorities, professional organisations)
What are factoring companies?
206
Organisations that buy credit card receipts at a discount and use their merchant bank accounts to convert the receipts into cash
factoring = Aufkauf von Forderungen
What is a fronter?
207
An employee involved in a telemarketing scam who calls victims to make the initial sales pitch
What is a closer?
208
A veteran employee involved in a telemarketing scam to whom interested callers are transferred and that convinces the person to buy
What is verifier?
209
An employee involved in a telemarketing scam who reads vague words about the deal and records the victim’s agreement
What is a Ponzi scheme?
210
an illegal business practice in which new investors’ money is used to make payments to earlier investors
What is an illegal pyramid?
211
A scheme in which the bulk of the earnings are dependent on money brought in from new recruits with an emphasis on advancing to ever higher stages
What is shoulder surfing?
212
A method used by identity thieves to optain information by overhearing conversations or covertly observing the input of credit card numbers, account information, or PIN codes into machines or documents
What is turnkey?
213
An individual or entity that provides telemarketing scammers with autodialers, phone lists, credit card receipts, and merchandise they require to operate
turnkey = Türöffner (in diesem Zusammenhang)
Liefert Daten von möglichen Opfern
What is password cracking?
214
An automated process by which an attacker attempts to guess a system user’s password
= Passwort-Knacken
What is social engineering?
215
A method for gaining unauthorised access to a system or to information in which the attacker deceives victims into disclosing personal information or convinces them to committ acts that facilitate the attacker’s intended scheme
to deceive = täuschen irreführen
“direkt im sozialen Kontakt, Informationen und persönliche Informationen herausholen”
What is phishing?
216
A method used for gaining unauthorised access to a computer system in which a perpetrator dupes an individual or business into providing sensitive data, such as passwords or account numbers, by falsely claiming to be from an actual business, bank, ISP, or other entity in which the target does business
perpetrator = Eindringling, Täter
to dupe = einseifen, übertlisten, übertölpeln
What is SMiShing?
217
A type of phishing attack in which the fraudster uses text messages or other short message services to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or orther entity
What is pharming?
218
An attack in which a user is fooled into entering sensitive data (such as password or credit card number) into a malicious website that impersonates a legitimate website.
to impersonate = sich als jemanden ausgeben
malicious = hinterhältig, bösartig
Abgrenzung zum Phishing? Ist es nur das Medium? Web vs. eMail, SMS etc.?
What is the piggybacking method used to gain access to restricted areas?
219
A method in which the attacker exploits a false association with another person who has legitimate access to the area
piggybacking = huckepack machen
Sich im Huckepack an jemanden dranhängen, um Zutritt zu erhalten
What is malware?
220
An umbrella term used to describe any kind of malicious software, including viruses, worms, trojans, spyware and botnets
What is spyware?
221
A type of software that collects and reports information about a computer user without the user’s knowlwdge or consent
What is a trojan horse?
222
A programme or command procedure that gives the appearance of being useful but in fact contains hidden code that causes malicious damage
malicious = arglistig
What is acomputer worm?
223
A malicious self-replicating computer programme that penetrates operating systems to spread malicious code to other computers
What are keyloggers?
224
Software or hardware tools that monitor and log (or track) the keys pressed on a system’s keyboard
5 information security goals for e-commerce systems
225
confidentiality of data (Vertraulichkeit)
integrity of data (Datenintegrität, Unversehrtheit)
availability of data (Datenverfügbarkeit)
authentication (authentifizierung)
non-repudiation (unleugbarkeit, nachweislich der Wahrheit entsprechend)
What is e-commerce?
226
The process whereby 2 or more parties make business transactions via computer and some type of network
What is authentication (in the context of e-commerce systems)?
227
The validation of a customer’s identity
What is a non-repudiation (in the context of e-commerce systems)?
228
A guarantee that the parties involved in an e-commerce transaction cannot repudiate (deny) participation in the transaction
= Protokoll für Nachweisbarkeit
What are physical access controls?
229
Controls that allow or restrict users’ access to physical objects or areas
What is vishing?
230
The act of leveraging Voice over Internet Protocol (VoIP) to falsely claim to be a legitimate enterprise in an attempt to scam users into disclosing personal information
What is spear phishing?
231
Phishing attacks that target a specific organisation in which messages that falsely appear to originate from within the organisation (e.g., from the IT or HR department) are sent to the entity’s employees in order to obtain the employees’ usernames and passwords to access the corporate network.
spear = Speer
What is rock phishing?
232
Phishing attacks that employ botnets to send massive amounts of phishing emails to huge volumes of internet users
What is a firewall?
233
A device that blocks unauthorised or unverified access to network assets by surveying incoming and outgoing transmissions.
What are logical access controls?
234
Controls that allow or restrict users’ access to computer systems and networks
What is encryption?
235
The deliberate scrambling of a message so that it is unreadable except to those who hold the key for unscrambling the message
What is an intrusion detection system?
236
A device or software application that monitors an organisation’s inbound and outbound network activity and identifies any suspicious patterns of activity that might indicate a network or system attack or security policy violations
What are sniffers?
237
Computer programmes that monitor traffic on areas of a network and search for packets of data a they pass through the network.
What is a trapdoor (in the context of information security)?
238
A secret entry point into a programme that allows someone who is aware of the trapdoor to gain access without going through the usual security access proceures
trapdoor = falltür