Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Identity And Access Management

Discover how Identity and Access Management (IAM) protects sensitive data, streamlines user access, and enhances security for businesses across banking, e-commerce, and more in this essential guide.

Identity Cloning

Discover what identity cloning is, how it works, its financial and legal impacts, and practical steps to protect yourself from this growing threat in our comprehensive guide.

Identity Fraud

Identity fraud is the situation where a fraudster uses the personal information of a victim, without any approval, to perform a criminal action or to mislead or defraud the other person. Most...

Identity Fraud as a Service (IFaaS)

Explore how Identity Fraud as a Service (IFaaS) is changing cybercrime, its impact on businesses and consumers, and discover strategies to protect against evolving fraud threats in the digital age.

Identity Provider

An identity provider is a federation partner that vouches for the identity of a user. The identity provider authenticates the user and provides an authentication token (that is, information that...

Identity Risk Profiling

Discover how Identity Risk Profiling helps organizations detect vulnerabilities, predict threats, and prevent fraud—ensuring stronger security for individuals and businesses in today’s digital world.

Identity Spoofing

Discover what identity spoofing is, how it works, real-world risks, and ways to protect yourself and your business from cyber threats in this essential guide for digital safety.

Identity Theft

Discover what identity theft is, its financial and emotional impact, key prevention tips, recent statistics, and how advanced solutions like FraudNet can help you stay protected in the digital age.

Impersonation Of The Deceased Fraud (IOD)

Discover how fraudsters impersonate the deceased to steal assets and benefits, the impact on families, real-world examples, and how to protect loved ones from IOD fraud in our latest blog post.

Impersonation Scams

Discover how impersonation scams work, their impact, and tips to protect yourself. Learn about common tactics, real-world examples, and prevention strategies in this essential guide.

Improper Disclosures

Discover what improper disclosures are, their causes, risks, and prevention strategies, plus key statistics and FAQs to help you safeguard sensitive data and ensure compliance in your organization.

In-app Payment Fraud

Discover what in-app payment fraud is, how it happens, its financial impact, and the latest trends—plus tips for users and businesses to prevent losses and keep your mobile transactions secure.

Incident Response for Financial Fraud

Discover how organizations detect, manage, and recover from financial fraud incidents. Learn about essential response steps, real-world use cases, and tips to strengthen your defenses against fraud.

InfoSec (Information Security)

InfoSec, short for Information Security, refers to the discipline of defending information from unauthorized access, use, disclosure, disruption, modi cation, perusal, inspection, recording or...

Insider Threat

An insider threat refers to a security risk that originates from within an organization. It involves employees, contractors, business partners, or anyone with authorized access who misuses their privileges to harm the organization...

Insider Threats

Discover what insider threats are, their types, motives, and real-world examples. Learn how to detect, prevent, and mitigate risks to protect your organization from internal security breaches.

Instagram Scammer

An Instagram scam could be described a scheme fraudsters perform through the use of social media, such as Instagram, or other related applications in the smartphone, in order to gain access to...

Insurance Fraud

Discover what insurance fraud is, its impact, common schemes, and how modern tech solutions help fight back. Learn key facts and ways to protect yourself in this essential guide.

Intellectual Property

Intellectual property, also known as IP, describes an item or idea that has been credited as belonging to somebody in some way. Common types of IPs would be patented or copyrighted materials.

Intelligence

Fraud Intelligence is the leading practical resource for the counter-fraud professional; it provides applied insight, analysis and tools to combat fraud and corruption, whether in the corporate or...

Intelligence Augmention

Intelligence Augmentation, or IA, is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that cognitive technology is designed to...

Internal Fraud (Insider Fraud)

What is Insider Fraud? Insider fraud refers to fraudulent activities committed within an organization by individuals with access to sensitive information, systems, or resources due to their positions...

Internal Fraud Monitoring

Discover how internal fraud monitoring protects your business from insider threats using data analytics, AI, and best practices—ensuring security, compliance, and organizational trust.

International Accounting Standards (IAS)

Discover how International Accounting Standards (IAS) enhance transparency, consistency, and fraud prevention in global financial reporting. Learn their impact and key use cases in this guide.

International Convention for the Suppression of the Financing of Terrorism

Discover how the International Convention for the Suppression of the Financing of Terrorism combats terrorist funding through global legal standards, asset freezing, and international cooperation.

International Financial Reporting Standards

Discover how International Financial Reporting Standards (IFRS) boost global financial transparency, support investors and regulators, and help prevent fraud through consistent, comparable financial reporting.

International Organization of Securities Commissions (IOSCO) Principles

Discover how IOSCO Principles set global standards for securities regulation, enhancing investor protection, market transparency, and financial stability in today’s interconnected markets.

Interoperability

Discover how interoperability connects systems for seamless data sharing, boosts efficiency, and strengthens fraud prevention—unlocking innovation and collaboration in today’s digital landscape.

Inventory Fraud

Inventory fraud involves the theft of physical inventory items and the misstatement of inventory records on a company's financial statements. A small business may be a victim of fraud perpetrated by...

Investment Fraud

Discover the risks, tactics, and common schemes of investment fraud—and learn how to protect your finances with expert tips and the latest fraud prevention solutions in our comprehensive guide.

Invisible Web

Discover what the Invisible Web is, why it matters, and how it holds valuable, hidden information beyond search engines—crucial for research, compliance, and online safety. Explore its benefits and risks!

Invoice Factoring Fraud

Discover how invoice factoring fraud works, its impact on businesses and lenders, real-world examples, and practical tips for prevention and detection in this essential guide for financial professionals.

IoT Payment Fraud

Discover how IoT payment fraud targets smart devices, the risks involved, and practical steps to protect your financial data. Learn about emerging threats and solutions for safer IoT transactions.

Iot Botnet

Discover what IoT botnets are, how they threaten connected devices, and practical steps to protect your business and home from evolving cyber risks in our comprehensive guide.

Ip Address Verification

Discover how IP Address Verification boosts security, prevents fraud, and builds trust for businesses—explore its benefits, use cases, key stats, and how to implement it effectively.

Isp Monitoring

Discover how ISP monitoring helps ensure reliable, fast internet and protects your online security. Learn key features, use cases, stats, and tips to boost performance and privacy.

Issuer (Issuing Bank)

The Issuing Bank is the financial institution which issues individuals with credit cards or debit cards and extends short-term lines of credit to purchase goods and services. Familiar issues include...

J

Japan’s Act on Prevention of Transfer of Criminal Proceeds

Discover how Japan’s Act on Prevention of Transfer of Criminal Proceeds combats money laundering and fraud, with key rules for financial institutions and the latest trends in compliance and enforcement.

Jitter

Discover what jitter is, how it impacts network performance and fraud detection, and explore ways to measure, manage, and reduce jitter for seamless, secure digital communications.

Junk Data Attacks

Discover how Junk Data Attacks overwhelm systems with meaningless data, their impact on performance and security, and practical strategies to protect your business from these growing cyber threats.

K

KYC Automation

Discover how KYC automation streamlines customer verification, boosts compliance, and enhances efficiency—unlocking better security and customer experiences for modern businesses.

Keylogging

A keylogging program logs the keypresses on a device. Fraudsters covertly download these onto devices through various methods, and then read the keys recorded in order to discover things like the...

Keystroke Dynamics

Keystroke dynamics or typing dynamics refers to the automated method of identifying or confirming the identity of an individual based on the manner and the rhythm of typing on a keyboard. Keystroke...

Keystroke Logger

Discover what keystroke loggers are, how they work, their uses in security and fraud detection, associated risks, and practical tips to protect your data in today’s digital world.

Kickbacks

Curious about kickbacks? This article explains what they are, their risks, real-world examples, and how businesses can prevent them to maintain trust and compliance. Dive in to learn more!

Kite Financing Fraud

Discover how kite financing fraud manipulates bank accounts and financial records, its impact on institutions, and key prevention strategies to protect your business from evolving financial threats.

Know Your Business

Know Your Business (KYB) is a regulatory process undertaken by financial institutions, payment processors, and other businesses to verify and validate the legitimacy of the companies they engage with. KYB plays a critical role in ensuring compliance with legal requirements, preventing financial crimes, and maintaining the integrity of the global financial ecosystem.

Know Your Customer (KYC)

Discover how Know Your Customer (KYC) safeguards financial systems, prevents fraud, and boosts trust—plus the latest trends, challenges, and tech shaping KYC across industries.

Know Your Merchant

Know Your Merchant (KYM) refers to the process through which financial institutions, payment processors, and other entities validate and monitor the businesses (merchants) they work with to prevent fraud, financial crimes, and non-compliance with regulatory requirements. KYM processes are integral to identifying high-risk businesses, ensuring compliance with laws and regulations, and mitigating risks associated with financial and reputational harm.

Know Your Vendor

Know Your Vendor (KYV) refers to the process by which organizations assess, validate, and monitor the vendors and suppliers they work with to ensure compliance with regulations, reduce operational risks, and foster ethical and transparent business practices. It is a strategic approach to safeguarding supply chains, protecting brand reputation, and mitigating vulnerabilities that could arise from engaging with unverified or high-risk vendors.

Kyc Know Your Customer

Discover what KYC (Know Your Customer) means, why it’s crucial for security and compliance, and how advanced solutions streamline identity verification across industries. Read on to learn more!

L

Law Enforcement

Law enforcement could be described as a system where a number of members of society act in a systematic way to enforce the law, determining, discouraging, assimilating or even punishing those who...

Layered Security Approach

Discover how a layered security approach uses multiple defenses to protect against evolving cyber threats, safeguard your data, and enhance compliance in today’s digital landscape.

Legacy Fraud Prevention Systems

Discover how legacy fraud prevention systems work, their limitations, and why upgrading to modern, AI-driven solutions is crucial for protecting your business from today’s sophisticated threats.

Lending

Lending (also known as "financing") in its most general sense is the temporary giving of money or property to another person with the expectation that it will be repaid. In a business and financial...

Level Of Assurance

Discover how Level of Assurance (LoA) boosts digital security by verifying identities, managing access, and preventing fraud in sectors like banking, e-commerce, and software. Learn more inside!

Liability Shift

Discover what a liability shift is, how it impacts merchants and card issuers, and why adopting secure payment technologies like EMV is crucial for reducing fraud and protecting your business.

Loan Application Fraud Detection

Discover how data analytics and machine learning help detect and prevent loan application fraud, protecting lenders and applicants from identity theft, income misrepresentation, and document forgery.

Loan Default Fraud

Discover what loan default fraud is, how it impacts lenders, real-world examples, key statistics, and practical prevention tips—all in our comprehensive, easy-to-read guide for every financial professional.

Loan Stacking Fraud

Discover how loan stacking fraud works, its impact on lenders, real-world examples, and the latest prevention strategies to protect your business from financial losses and fraud risks.

Log File

Discover how log files are vital for monitoring, troubleshooting, security, and fraud prevention. Learn key benefits, use cases, and best practices in this essential guide for businesses and IT teams.

Login

Discover the essentials of login security, challenges, and best practices. Learn how modern technology and solutions protect your accounts and keep your information safe in today’s digital world.

Login Authentication

The process that recognizes and validates a user's identity is known as login authentication. A common example is having to enter both a username and password into a website in order to gain access...

Lottery Scam

Curious about lottery scams? Learn how these frauds work, common warning signs, real-life examples, and expert tips to protect yourself and your business from falling victim. Stay informed and safe!

Loyalty Points Fraud

Discover how loyalty points fraud threatens businesses and consumers, explore common tactics used by fraudsters, and learn effective strategies to protect your rewards and customer trust.

Loyalty Program Fraud

Discover how loyalty program fraud threatens businesses and consumers, the tactics fraudsters use, real-world stats, and effective steps to protect your rewards programs and accounts.

M

MAS Notices on AML/CFT

Discover how MAS Notices on AML/CFT help Singapore’s financial institutions fight money laundering and terrorism financing through robust compliance, customer due diligence, and advanced monitoring.

MFA (Multi-Factor Authentication)

What is Multi-Factor Authentication (MFA)? MFA or Multi-Factor Authentication, also called Step-Up Authentication, is an approach to security authentication, in which the user of a system provides...

Machine Learning

Machine learning (ML) refers to the development of computer algorithms and statistical models to perform predictions and specific tasks without explicit instructions, rather using inferences and...

Machine Learning Adversarial Attacks

Discover how adversarial attacks target machine learning models, their real-world risks, and the latest defense strategies to keep AI systems secure and trustworthy in today’s evolving threat landscape.

Machine Learning Risk Scoring

Discover how Machine Learning Risk Scoring transforms risk assessment with data-driven accuracy, real-world use cases, key benefits, and the latest industry statistics. Explore the future of risk management!

Machine Learning in AML Compliance

Discover how machine learning is transforming AML compliance by automating suspicious activity detection, improving accuracy, reducing false positives, and streamlining financial risk management.

Mail Fraud And Wire Faud

Discover the key differences between mail and wire fraud, real-world examples, recent stats, and tips to protect yourself—all in one easy guide. Stay informed and safeguard against scams!

Mail Order Telephone Order (MOTO)

Mail Order Telephone Order (MOTO) is a type of card-not-present (CNP) transaction in which services are paid and delivered via telephone, mail, fax, or internet communication. With the introduction...

Malware

Malware is software that is intentionally designed to cause damage to a computer, client, server or the network of a computer. Hostile, intrusive, and intentionally nasty, malware seeks to invade,...

Malware-based Fraud

Discover how malware-based fraud works, its impact, and prevention tips. Learn to protect yourself and your business from cyber threats with practical strategies and up-to-date insights.

Man-In-The-Browser

A man-in-the-browser is a type of online threat, where a hacker uses a trojan horse virus to gain access to your computer. From there, the hacker manipulates the content you see within your web...

Man-In-The-Middle

Man-in-the-middle (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Man-in-the-Middle (MITM) Attacks

Discover how Man-in-the-Middle (MITM) attacks threaten online security, common methods used, real-world examples, and key strategies to protect your data and privacy in today’s digital world.

Manpower Direct And Indirect Costs

Discover the difference between direct and indirect manpower costs, why they matter for your business, and how to manage them efficiently for optimal performance and cost control.

Manual Review

Discover the importance of Manual Review—how human oversight ensures data accuracy, compliance, and quality in today’s automated world. Learn key use cases, statistics, and best practices in our guide.

Manual Submission

Manual submission describes when somebody adds URLs to a search engine manually, filling out the form fields individually. This differs from automatic submissions, which involve filling out...

Market Manipulation

Discover what market manipulation is, why it’s illegal, common tactics used, and how investors and businesses can identify and protect against fraud for a safer, more transparent financial market.

Marketplace

Discover how marketplaces connect buyers and sellers, streamline transactions, and build trust. Explore key benefits, challenges, use cases, and essential tips for thriving in today’s digital marketplace.

Marketplace Fraud

Explore how marketplace fraud affects online buyers and sellers, discover common scam tactics, key statistics, and learn proactive steps to protect your digital commerce experience in our latest guide.

Markets in Financial Instruments Directive II (MiFID II)

Discover how MiFID II boosts transparency, investor protection, and fair trading in EU financial markets. Learn about its impact, key rules, and compliance tips in our concise guide.

Medical Fraud

Medical fraud is a type of white-collar crime that involves the filing of dishonest health care claims in order to turn a profit. Health care fraud influences insurance rates every day, causing...

Medical Identity Theft

Medical identity theft occurs when somebody illegally accesses and uses a patient's personally identifiable information (PII) to obtain medical treatment, services or goods. The stolen information...

Merchant Account

Discover how merchant accounts help businesses accept card payments securely, manage cash flow, and support growth. Learn use cases, key stats, and how to protect your business from payment fraud.

Merchant Account Provider

Merchant account providers give businesses the opportunity to accept debit and credit cards for the payment of goods and services. This can be conducted face-to-face, over the phone, or even over the...

Merchant Chargeback Insurance Provider

Curious about merchant chargeback insurance? Discover how providers protect businesses from costly disputes and support financial stability. Learn more about solutions, benefits, and industry trends!

Merchant Identity Verification

Discover how Merchant Identity Verification builds trust, prevents fraud, and ensures regulatory compliance—essential steps for secure business transactions and a safer digital marketplace.

Merchant Laundering

Discover what merchant laundering is, how it threatens financial systems, and the latest trends and solutions to detect and prevent this growing form of payment fraud. Stay informed and protected!

Merchant Monitoring

Discover how Merchant Monitoring protects businesses and customers from fraud, ensures compliance, and builds trust through real-time tracking and analysis of merchant activities.

Micro-Finance Loan Fraud

Discover how micro-finance loan fraud impacts borrowers and lenders, common fraud tactics, real-world cases, prevention strategies, and how technology like FraudNet helps safeguard financial systems.

Micro-deposit Fraud

Discover how micro-deposit fraud works, its risks, and how to stay protected. Learn the latest trends, real-world use cases, and proactive steps for securing your financial accounts.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line