Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Fraud Upon The Court

Discover what "Fraud Upon The Court" means, its impact on legal proceedings, real-world examples, recent stats, and how businesses can detect and prevent this serious ethical violation.

Fraud Vs Forgery

Explore the differences between fraud and forgery, their legal impacts, and top tools to detect and prevent these growing threats.

Fraud Waste And Abuse

Fraud, waste, and abuse drain budgets and damage trust. Discover the warning signs and how to protect resources effectively.

Fraud Waste And Abuse Training

Fraud, Waste, and Abuse Training empowers teams to spot misconduct. Learn how education helps safeguard corporate integrity.

Fraud vs Abuse

Learn the difference between fraud and abuse, how intent sets them apart, and what businesses can do to prevent unethical activity.

Fraud vs Theft

Learn how fraud and theft differ, the main types of each, and key strategies businesses use today to detect and prevent both.

Fraudulent Apps

Fraudulent apps steal data and money. Spot app red flags and see how FraudNet tools enhance mobile threat defense.

Friendly Fraud

Friendly fraud occurs when customers dispute legitimate charges—learn its impact on merchants and tips to prevent losses.

Front Companies

Front companies disguise ownership to hide illegal activity. Understand how they operate and how to spot this fraud tactic.

Fullz

What is Fullz? "Fullz" is fraudster slang for an information package containing a person’s real name, address, and form of ID,  or their "full information." Fullz can be considered a component of 3rd...

G

Gaming Fraud

Gaming fraud disrupts fair play and costs developers and players. Discover trends, examples, and tactics to keep gaming spaces secure.

General Data Protection Regulation

GDPR protects EU personal data and shapes global compliance. Learn principles, fines, and how to stay compliant effectively.

Geo-spoofing

Geo-spoofing masks a user’s true location for access or fraud. Learn the risks, legal concerns, and how to detect it quickly.

Geo-velocity Fraud Detection

Geo-velocity checks flag rapid location shifts to spot fraud attempts without hurting user experience or performance.

Geographical Ip Detector

Geographical IP tools detect unusual locations to boost personalization, security, and fraud protection online.

Geolocation Detection

Geolocation detection monitors user position to spot fraud risk. Learn privacy considerations and smart use cases in security.

Ghost Card Fraud

Ghost card fraud uses fake account numbers to steal funds. Spot warning signs and protect your systems with smart defenses.

Ghost Employee

Ghost employees drain payroll through fake staff. Learn how they work, their business impact, and how to detect and prevent them.

Ghost Employee Fraud

Ghost employee fraud inserts fake workers into payroll systems. Discover how to spot and prevent this expensive insider scam.

Ghost Terminal

Discover how Ghost Terminal lets IT teams manage servers remotely, track sessions, and run commands securely from a central platform.

Ghost Vendor Fraud

Ghost Vendor Fraud invents fake suppliers to steal payouts. Learn how companies detect it before money disappears.

Gift Card Scammer Numbers

Spot, stop, and report gift card scammer numbers with key red flags, prevention tips, and tactics to protect yourself from rising fraud.

Global Address Verification Directories

Global Address Verification ensures accurate worldwide data. Discover how it improves delivery, compliance, and fraud control.

Government Benefit Fraud

Government benefit fraud steals public funds through false claims. Explore schemes and defenses to protect social systems.

Government Fraud

Government fraud steals taxpayer funds through dishonest claims. Learn how cases are uncovered and prevented with new tools.

Government Procurement Fraud

Government procurement fraud inflates public project costs. Explore types and defenses to protect taxpayer dollars.

Gps Spoofer

GPS spoofers fake locations to mislead systems and users. Explore risks, real-world uses, and tools to detect these threats.

H

Hacktivist Fraud

Hacktivist fraud blends cybercrime with political activism. Discover common tactics and stay ahead with proactive protection measures.

Hash

Hash functions encode data for safer storage and transfers. Explore how they support fraud prevention and digital integrity.

Healthcare Fraud

Healthcare fraud exploits systems using false claims or billing. Learn how AI tools protect patients and medical providers.

High Risk Industry

High-risk industries face greater fraud and legal exposure. See top challenges and tech used to manage sector-specific threats.

High-risk Jurisdictions

High-risk jurisdictions pose compliance challenges. Learn how to manage exposure and prevent financial crime globally.

High-risk Merchants

High-risk merchants face payment hurdles and extra fraud exposure. Explore smart strategies to stay secure and process safely.

Honeypot

Honeypots lure cyber attackers to detect threats. Learn how they safeguard assets and support stronger cyber defenses.

Honeypots

Honeypots lure cybercriminals with fake systems and data. Learn how this tactic detects threats before real damage happens.

Hong Kong AML/CTF Ordinance

Hong Kong’s AML/CTF Ordinance secures finance through due diligence. Learn how businesses meet these tough compliance rules.

Host Card Emulation

Host Card Emulation enables mobile payments without cards. Learn its security risks, benefits, and how to stay protected.

Hybrid Detection System

Hybrid Detection Systems mix rules and AI to catch threats early. Learn how they lower false alerts and boost security.

I

I2P Anonymous Proxy

I2P Anonymous Proxy boosts privacy with hidden online routing. Discover compliance tips to manage its fraud and risk concerns.

ID Spoofing in Financial Transactions

ID spoofing replaces real identities with fakes to steal funds. Explore tactics and defenses to protect against identity-based financial fraud.

IP Address Fraud

Fraudsters use IP tricks to bypass defenses. Learn how IP fraud works, real use cases, and ways to protect your systems today.

IT Risk Management

IT Risk Management defends systems against cyber threats. Discover core tactics to protect your business and reputation.

Identity And Access Management

IAM systems control user access across digital services. See why they’re vital for safe, efficient enterprise operations.

Identity Cloning

Identity cloning copies your personal data for fraud. Learn how it works, its impacts, and simple ways to protect yourself.

Identity Fraud

Identity fraud misuses personal data for crime or deception. Learn how to protect yourself from this growing digital threat.

Identity Fraud as a Service (IFaaS)

Identity Fraud as a Service gives criminals ready-made attack kits. Learn how to defend against this fast-growing cyber threat.

Identity Risk Profiling

Identity Risk Profiling highlights weak points before fraud strikes. Explore how scores guide smarter defenses for organizations.

Identity Spoofing

Identity spoofing uses fake data to fool systems. Learn how it works, the risks, and how to protect yourself today.

Identity Theft

Identity theft steals personal data for crime and fraud. Learn how to protect yourself using smart tools and safer habits.

Impersonation Of The Deceased Fraud (IOD)

Impersonation of the deceased drains accounts without detection. Explore how families and firms can stop this growing threat.

Impersonation Scams

Impersonation scams trick victims by posing as known contacts or brands. Discover warning signs and tips to stay safe from these schemes.

Improper Disclosures

Improper disclosures expose sensitive data and lead to compliance risks. Find out how to prevent leaks and stay protected.

In-app Payment Fraud

In-app payment fraud drains funds via mobile transactions. Discover top trends and tips to keep users and businesses safe.

Incident Response for Financial Fraud

Fraud incident response plans help firms detect, contain, and recover from financial crime while strengthening defenses.

Insider Threat

Insider threats come from trusted users misusing access. Learn how businesses detect and stop internal data breaches.

Insider Threats

Insider threats occur when trusted users abuse system access. Learn how to detect risk early and improve internal controls.

Insurance Fraud

Insurance fraud costs billions through staged claims and scams. Learn how new technologies help customers and insurers fight back.

Internal Fraud (Insider Fraud)

Insider fraud happens when trusted employees abuse access for personal gain—learn risks, examples, and how to prevent it.

Internal Fraud Monitoring

Internal fraud monitoring spots insider threats before damage spreads. Discover how data and AI protect business integrity.

International Accounting Standards (IAS)

IAS promotes transparency and consistency in reporting. Learn how it supports fraud prevention and improves global standards.

International Convention for the Suppression of the Financing of Terrorism

The Terrorism Financing Convention fights extremist funding worldwide. Explore how asset freezes and laws help stop threats.

International Financial Reporting Standards

IFRS creates global transparency in financial reporting to win investor trust, combat fraud, and improve comparability.

International Organization of Securities Commissions (IOSCO) Principles

IOSCO Principles guide global securities regulation. They help safeguard transparency, stability, and investor protection.

Interoperability

Unlock safer data sharing with true interoperability. Smart integrations boost innovation while reducing fraud across platforms.

Inventory Fraud

Inventory fraud includes stealing items and falsifying records. Learn how it hurts businesses and how to detect and prevent it.

Investment Fraud

Investment fraud uses deceptive promises to steal savings. Explore common schemes and smart ways to protect your finances.

Invisible Web

The Invisible Web stores critical hidden data beyond search engines. Learn its research benefits and privacy challenges.

Invoice Factoring Fraud

Invoice factoring fraud creates fake receivables to get cash. Learn prevention tips to protect lenders and business owners.

IoT Payment Fraud

IoT payment fraud targets smart devices processing transactions. Explore practical tips to safeguard your connected payments.

Iot Botnet

IoT botnets turn smart devices into hacking weapons. Learn how to protect your network from these connected threats.

Ip Address Verification

IP address verification checks user location to block fraud. Learn how it strengthens security and improves business trust online.

Isp Monitoring

ISP monitoring improves speed, privacy, and online security. See how tracking performance helps defend against cyber risks.

Issuer Issuing Bank

Issuing banks manage card creation and security. See their fraud role and how to pick the right issuer for your needs.

J

Japan’s Act on Prevention of Transfer of Criminal Proceeds

Japan’s AML Act blocks criminal proceeds through robust financial rules. Explore compliance trends and enforcement insights.

Jitter

Jitter disrupts clean data flow in networks and fraud tools. Explore how managing jitter improves performance and security.

Junk Data Attacks

Junk data attacks flood systems with meaningless input, slowing performance. Learn how to block them and boost defenses.

K

KYC Automation

KYC automation speeds onboarding, ensures compliance, and improves customer experience with smarter verification tools.

KYC Know Your Customer

KYC verifies customer identities to prevent fraud. See why it matters for compliance and how modern tools simplify the process.

Keystroke Logger

Keystroke loggers record user inputs to track fraud or steal data. Learn their risks, benefits, and how to block attacks.

Kickbacks

Kickbacks involve secret payoffs that damage trust and compliance. Understand how they work and what businesses can do to avoid them.

Kite Financing Fraud

Kite financing fraud floats bad checks between banks to hide shortages. Uncover key tactics to protect your institution.

Know Your Business

Know Your Business checks company legitimacy before onboarding. Learn how KYB prevents crime and protects financial systems.

Know Your Customer (KYC)

KYC verifies customer identity to block fraud and boost trust. Learn trends and tools shaping modern compliance programs.

Know Your Merchant

Know Your Merchant validates businesses before onboarding. Discover how KYM helps prevent fraud and regulatory violations.

Know Your Vendor

KYV programs vet vendors to prevent supply chain fraud. Learn how strong checks protect operations and brand credibility.

L

Layered Security Approach

Layered security stacks multiple defenses to block cyberattacks. Build stronger protection and meet compliance requirements.

Legacy Fraud Prevention Systems

Legacy fraud systems struggle against modern digital threats. Discover why upgrading to AI solutions is crucial for protection.

Level Of Assurance

Level of Assurance verifies user trust with graded identity checks. Discover how it prevents fraud across key digital services.

Liability Shift

Discover what a liability shift is, why it matters for merchants and issuers, and how secure EMV tech helps reduce payment fraud.

Loan Application Fraud Detection

Loan fraud uses fake identities or income claims. Learn how analytics spot fraud early to protect lenders and applicants.

Loan Default Fraud

Loan default fraud happens when borrowers take funds without intent to repay. Explore detection methods protecting lenders.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line