Other Fraud Schemes Flashcards
DISPARATE PRICE SCHEME
Providers charge some patients a lower rate than the government
DOUBLE PLEDGING COLLATERAL SCHEME
Borrowers pledge the same collateral with different lenders BEFORE liens recorded and WITHOUT telling the lenders
Which business (small or large) are at greater risk of identity theft?
Smaller because they have lines of credit, capital, etc. desired by fraudsters and lack resources/tech to defend against identity theft
What is LOGICAL ACCESS?
users allowed to use computer systems and networks
What are LOGICAL ACCESS CONTROLS?
users identified and granted privileges to information, systems or resources. these controls are designed to protect confidentiality, integrity and availability of informational resources.
What are the types of reimbursements for providers?
(1) FEE FOR SERVICE; provider receives payment for each service rendered. CON: creates incentive to increase compensation by performing excess and unnecessary services. PRO: provides wide discretion in selecting services
(2) CAPITATION; provider receives one lump sum for each patient treated, regardless of amount of services. CON: focuses on quantity vs quality. PRO: avoids incentive to perform unnecessary services
(3) EPISODE OF CARE; provider receives one lump sum for all services related to a condition or disease (not per patient). PRO: more fair as it compensates more
(4) SALARY
What is TECHNICAL SECURITY?
use of safeguards incorporated in computer hardware, operations or applications software/related devices
What is ADMINISTRATIVE SECURITY?
use of tools to provide an acceptable level of protection for computing resources
COMMON TECHNICAL AND ADMINISTRATIVE CONTROLS?
- logical access controls
- network security
- operating systems security
- encryption
- application security
- separation of duties
What are BUFFER OVERFLOWS AND PRIVILEGE ESCALATION?
methods of exploiting design flaws in computer systems to obtain unauthorized access
What is the PAST POSTING scheme?
those involved in automobile accident but not insured. as such, they get insurance, wait, and then reporter vehicle having been damaged.
EFT SCHEME
electronic funds transfer scheme by misappropriating customer’s account and password information.
SCAVENGING
collecting information left around computer systems
DUMPSTER DIVING
obtaining sensitive information by looking through someone else’s trash
SHOULDER SURFING
observing an unsuspecting target from a nearby location while the target enters username/password etc.
SPOOFING
individual impersonates legitimate user to obtain access to target’s network
How can a manual file system be attacked?
- pilfer trash
- act as cleaning crew member
- commit theft of burglary
How to protect manual file systems?
- shredding sensitive documents
- sending/receiving mail at secure site
- employing perimeter security system
- place sensitive docs in high-grade locked filing cabinets
ILLEGAL PYRAMID SCHEME
promoted by encouraging victim investors to recruit new members. the more members recruited, the higher the investor is purported and the more they make
An effective system for safeguarding sensitive and proprietary information should include
- task force
- security risk assessments
- awareness training
- NDA
- data minimization
ROCK PHISHING
use botnets to send massive amounts of phishing emails to huge volumes of users.
emails contain message from financial institutions enticing users to click on fraudulent url
SMiSHING
hybrid of phishing and short message service . attacker uses text messages to dupe an individual or business into providing sensitive data
WHAT IS SOCIAL ENGINEERING
act of using deceptive techniques to manipulate people into taking certain actions or disclosing information.
WHAT TECHNIQUES DO SOCIAL ENGINEERS USE TO OBTAIN INFORMATION
various forms of trickery persuasion threats cajolery