Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Policy Monitoring

Policy monitoring tools track compliance issues in real time to help reduce risk and streamline regulatory processes.

Policy Violation

Policy violations pose major security risks—discover types, recent stats, and how tools like FraudNet help maintain compliance and trust.

Politically Exposed Person (PEP) Screening

PEP screening identifies politically exposed persons at higher risk. Strengthen compliance and trust with proactive checks.

Predictive Analytics for Risk

Predictive analytics uses historical data to flag future risks. Learn how it gives companies the upper hand against fraud.

Predictive Fraud Analytics

Discover how predictive analytics spots fraud before it strikes. Learn how data science boosts speed, accuracy, and security.

Prepaid Card Abuse

Prepaid card abuse tricks users into losing funds or identities. Learn how to safeguard card use with smarter fraud protection.

Privacy

Privacy protects personal data in today’s digital world. Learn your rights and best tips to hold onto your online information.

Processing Unauthorized Payroll

Unauthorized payroll processing siphons wages from companies. Learn internal controls to stop this costly category of fraud.

Proofing

Proofing helps dough rise and confirms identity. Learn its role in baking and security, plus how it supports fraud prevention.

Proxy Piercing

Proxy piercing improves speed and fraud detection. Learn how it works and key safety tips for secure use in digital systems.

Proxy Server Fraud

Proxy server fraud hides attackers behind fake locations. Learn to detect these schemes and protect your business online.

Pyramid Schemes

Pyramid schemes recruit victims through fake fees and promises. Learn how to spot and avoid these deceptive money traps.

Q

R

Ransomware Attacks

Ransomware locks systems and demands payment from victims. Explore impacts, real cases, and how to prevent these attacks.

Real-Time Payment Fraud

Discover how real-time payment fraud exploits instant transfers. Learn top strategies to protect both customers and revenue.

Real-time Fraud Detection

Real-time fraud detection analyzes live data to block bad behavior. Discover how it boosts trust and reduces financial loss.

Real-time Sanctions Screening

Real-time Sanctions Screening checks transactions against global lists instantly to reduce legal risk and ensure compliance.

Refund Fraud

Refund fraud abuses return processes for financial gain. Learn tactics to stop scammers and protect your business earnings.

RegTech (Regulatory Technology)

RegTech automates compliance using smart tools and AI. Explore how it cuts costs and strengthens risk management.

Regulatory Reporting

Regulatory reporting ensures financial transparency. See how automation helps cut costs and overcome reporting challenges.

Relying Party

Relying parties manage login verification using trusted providers. Learn how this supports secure digital identity ecosystems.

Remittance Fraud

Remittance fraud exploits cross-border transfers to steal money. Learn how modern checks keep global payments secure.

Remote Access Fraud

Remote access fraud hijacks devices to steal information or funds. Learn key strategies to defend against increasingly sophisticated scams.

Reputation Score Manipulation

Reputation score manipulation erodes online trust quickly. Discover the tactics and tools to safeguard your public credibility.

Retail Fraud

Retail fraud includes theft, scams, and returns abuse. Learn how modern tools help stores stay secure and profitable.

Retail Loss Prevention

Retail loss prevention strategies protect revenue from theft and fraud. Explore tools, tactics, and key industry stats.

Return Fraud

Return fraud involves abusing retail return policies or fake receipts to illegally profit from purchased goods. Learn how it works.

Return On Investment Roi

ROI measures how efficiently investments generate profit. Learn how to boost returns using real examples and expert tips.

Reverse Money Laundering

Reverse money laundering cleans legit funds to hide criminal links. Learn how firms detect this rising financial crime.

Risk Assessment

Risk assessment evaluates potential threats to operations. Discover how it guides smarter planning and safeguards projects.

Risk-Based Authentication (RBA)

Risk-based authentication evaluates login behavior dynamically. Discover how it blocks suspicious access before damage occurs.

Romance Scams

Romance scams use emotional trust to steal money online. Learn key signs and stay safe with proven fraud protection tactics.

Rules Engine

Rules engines automate complex decision logic for risk control. Learn how they increase speed, transparency, and fraud defense.

Rules-Based Fraud Detection

Rules-based fraud detection flags suspicious activity using preset criteria like timing, amounts, and transaction attributes.

Run Of Network (Ron)

Run Of Network ads boost reach across sites. Learn the benefits, challenges, and how to protect campaigns from digital fraud.

S

SCA (Strong Customer Authentication)

Strong Customer Authentication uses two elements to verify users. Explore how it reduces fraud in modern payment systems.

SIM Swapping

SIM swapping steals phone numbers to hijack accounts. Learn how to guard mobile identity from this growing fraud.

Sales Scam

Sales scams target buyers and sellers—learn how they work, their impact, and top tactics to protect yourself and your business.

Sanctions and Watch Lists

Sanctions and watch lists block illegal global activity. Learn how regulators use them to enforce security and compliance.

Sarbanes-Oxley Act (SOX)

Sarbanes-Oxley enforces stricter controls over corporate reporting. Explore how SOX boosts transparency and investor trust.

Scareware

Scareware fakes security alerts to trick users into installing malware. Stay safe with proven detection and prevention tips.

Scholarship Scam

Scholarship scams target students with fake offers. Learn how to spot secure financial aid and protect your personal info.

Scraper

Web scrapers collect online data automatically. See how they aid research and fraud detection and what legal issues to consider.

Script Kiddie

Script Kiddies use basic hacking tools with little skill. Learn their risks, attack methods, and how to stay protected.

Second Party Fraud

Second-party fraud uses money mules to move illicit funds. Learn how it works and how businesses can detect it early.

Secure Element

Secure Elements use tamper-proof chips to protect data in cards, IDs, and IoT devices, building deeper trust in digital systems.

Securities and Exchange Commission (SEC) Rules

SEC rules protect investors through market transparency. Learn the latest updates and how to stay compliant with confidence.

Self-Learning Fraud Prevention Systems

Self-learning fraud systems adapt using AI and new patterns. Discover how they detect threats faster and reduce false alerts.

Serious Fraud Office Sfo

The SFO tackles large-scale fraud and bribery cases. Learn how businesses can prepare and strengthen internal controls.

Shell Companies

Shell companies hide owners behind secret structures. Discover how to spot warning signs and guard against misuse.

Shopping Cart

Shopping carts power e-commerce checkout and secure sales. Learn how they improve customer experience and conversions.

Shoulder Surfing

Shoulder surfing steals sensitive data in public—discover how it happens and get practical tips to safeguard your information.

Sim Cloning

SIM cloning copies your phone data for fraud. Learn how scammers do it and practical ways to stay protected.

Single Sign On

Single Sign-On lets users access many apps with one login. Improve security while boosting convenience and productivity.

Skimmer

ATM skimmers steal card data using hidden devices. Discover how to recognize signs and protect payment information.

Skimming

Skimming helps readers quickly extract key ideas—and in payments, spot fraud fast. Explore tips for security and efficiency.

Skimming Attacks

Discover how skimming attacks target ATMs and checkout systems. Learn practical tools to protect your business and customers.

Skimming Cash Receipts

Skimming cash receipts quietly siphons business income. Discover proven detection methods to protect financial integrity.

Smart Card

Smart cards boost data security and enable safe digital payments. Learn their features, real-world uses, and future potential.

Smart Contract Fraud

Smart contract fraud exploits automated blockchain agreements. Learn how to identify risks and secure decentralized transactions.

Smishing

Discover how "smishing" scams use SMS to steal personal info, why they’re rising, and practical tips to protect yourself and your business from these deceptive mobile phishing attacks.

Smurfing Structuring

Smurfing breaks large cash into small deposits to avoid detection. Learn how banks use analytics to uncover structured schemes.

Sniffing

Network sniffing captures data traffic for analysis. Learn its uses, risks, and how to protect your network from cyber threats.

Social Engineering

Social engineering manipulates people instead of systems. Learn how to recognize psychological tricks before it’s too late.

Social Media Intelligence

Social Media Intelligence turns user activity into insight for fraud detection, trend analysis, and better decision-making.

Social Media Phishing

Social media phishing lures users through fake profiles and DMs. Learn prevention tips to protect accounts and data.

Software Piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries....

Spear Phishing

Spear phishing targets specific victims using realistic emails. Learn how to recognize and avoid these highly convincing scams.

Spider

Web spiders crawl information to power search and detection. Learn how they help fight fraud while mapping the digital world.

State-sponsored Fraud

State-sponsored fraud blends crime with geopolitics. Explore how to spot these threats and strengthen your organization’s defenses.

Subscription Billing Fraud

Subscription billing fraud causes unauthorized charges and hidden fees. Learn how to safeguard your finances in today’s subscription-based world.

Supervised Machine Learning

Supervised learning trains AI using labeled examples. Discover how it builds smarter systems in fraud detection and beyond.

Supply Chain Fraud

Supply chain fraud disrupts operations through hidden crime. Learn tactics and AI tools to secure vendors and goods flow.

Suspicious Activity Monitoring

Suspicious Activity Monitoring tracks unusual financial behavior to flag early risks. Learn how smart tools power real-time fraud protection.

Suspicious Transaction Report (STR)

STRs report suspicious transactions to fight crime. Learn why they matter and how businesses can improve compliance.

Sweepstakes Scam

Sweepstakes scams lure victims with fake prize promises. Learn how to spot the red flags and stay safely out of fraudsters’ reach.

Swindling

A swindler uses deceit to defraud victims for personal gain, causing financial harm through dishonest and unfaithful actions.

Synthetic Business Fraud

Synthetic business fraud merges fake and real data to fool systems. Uncover its impact and how firms fight this growing threat.

Synthetic Data

Synthetic data mimics real information for safer AI training. Discover its privacy benefits and powerful use cases.

Synthetic Identity

Synthetic identity fraud builds personas from real and fake info. Learn how to detect and stop this rising digital crime.

Synthetic Identity Creation

Synthetic identity fraud blends real and fake data to fool systems. Learn how banks detect these complex cases and reduce risk.

Synthetic Identity Fraud

Synthetic identity fraud is built from blended real and fake data. Spot the warning signs early to protect against big losses.

Synthetic Transactions

Synthetic transactions test and monitor app performance while boosting fraud detection and compliance accuracy.

System Integrator

System integrators connect tools for seamless data sharing. Learn how this improves security and strengthens fraud defenses.

T

Tech Support Scams

Tech support scams trick users with fake alerts and phone calls. Know the signs and keep your data safe from evolving threats.

Technology Theft

Technology theft steals innovation and sensitive IP. Discover how businesses protect assets using secure systems and policies.

Telecommunication Fraud

Telecom fraud steals or abuses phone services for profit. Explore how criminals exploit systems and how businesses can fight back.

Theft Of Assets

Asset theft drains business value through misused property and cash. Learn how controls help prevent costly misconduct.

Theft Of Checks

Check theft lets criminals steal funds using altered or stolen checks. Learn how to protect your accounts and mail.

Third-party Data Breaches

Third-party data breaches happen when vendors are hacked. Learn smart steps to protect your systems and customer data.

Third-party Fraud

Third-party fraud is on the rise across digital ecosystems. Strengthen defenses now to block outside actors from exploiting you.

Threat Intelligence Sharing

Threat intelligence sharing gives companies early cyber warnings. Discover how collaboration improves defense against modern attacks.

Timecard Tampering

Timecard tampering inflates hours and costs. Use modern tools to detect manipulation and secure payroll accuracy.

Token

Tokens replace sensitive data with secure digital units. Learn their growing role in payments, security, and identity.

Tokenization

Tokenization replaces real data with secure placeholders. Explore how it builds trust and improves compliance in transactions.

Tokenization Security

Tokenization replaces real data with secure tokens for safety. Explore how it cuts fraud risk across digital payments.

Tor

Tor provides anonymous browsing for privacy with risks. Use it safely with key tips, facts, and real-world examples.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line