Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

R

Ransomware Attacks

Learn how ransomware attacks work, their financial and psychological impacts, real-world examples, recent statistics, and effective prevention strategies—all in this essential guide for businesses and individuals.

Real-Time Payment Fraud

Discover how real-time payment fraud exploits instant payment systems, the latest fraud tactics, real-world examples, and top strategies for protecting your business and customers in our expert guide.

Real-Time Risk Management

Real-time risk management is a process which enables a person to handle risks associated with payments as the payment happens. It allows the person to effectively ensure that all the transactions are...

Real-time Fraud Detection

Discover how real-time fraud detection uses AI and data analysis to instantly stop fraud, protect businesses, and boost customer trust. Learn its benefits, challenges, and real-world applications.

Real-time Sanctions Screening

Discover how Real-time Sanctions Screening automates compliance, reduces risk, and protects your business from legal penalties by instantly checking transactions against global sanctions lists.

Record Destruction

Record destruction refers to the process of illegally destroying information stored in the form of documents. This is an ethically wrong practice and if spotted within an organization can lead to the...

Refund Fraud

Discover how refund fraud impacts businesses, the common tactics used by fraudsters, and effective prevention strategies to protect your company from losses in today’s digital retail environment.

RegTech (Regulatory Technology)

Discover how RegTech streamlines compliance, reduces costs, and boosts risk management for businesses. Learn about its impact, use cases, market growth, and how AI is shaping the future of regulation.

Regulatory Reporting

Discover the essentials of regulatory reporting, its importance, challenges, and how technology and automation help ensure compliance and transparency in today’s financial landscape.

Relying Party

Discover how Relying Parties streamline secure user authentication, enhance digital experiences, and protect against fraud using trusted identity providers and protocols like SAML, OAuth, and OpenID Connect.

Remittance Fraud

What is Remittance Fraud? Remittance fraud involves the fraudulent manipulation of funds when transferring money from one party to another across borders. This can occur through various channels,...

Remote Access Fraud

Discover how remote access fraud works, its risks, and how to protect yourself from evolving cyber threats. Learn key prevention tips and the latest statistics in this essential guide.

Reputation Score Manipulation

Discover how reputation score manipulation threatens trust online, the tactics behind it, and the latest tools and safeguards to protect your business’s credibility in the digital world.

Reshipping Fraud Scheme

In a reshipping scam, the criminals purchase high-value products with stolen credit cards and recruit willing or unsuspecting people (reshipping mules) to receive and forward the packages on behalf...

Retail Fraud

Discover what retail fraud is, its impact on businesses, and key prevention strategies. Learn about common fraud types and how advanced solutions help retailers fight back. Read more in our guide!

Retail Loss Prevention

Discover how retailers can protect profits and reduce theft with effective loss prevention strategies, real-world use cases, and the latest industry statistics in this comprehensive guide.

Return Fraud

What is Return Fraud? Return fraud is an online scam that occurs when a person purchases an item from a retail store with the intent to return it immediately or use duplicate receipts to get money...

Return On Investment (ROI)

Return on investment (ROI) is a performance measure used to evaluate the efficiency of an investment or compare the efficiency of a number of different investments. ROI tries to directly measure the...

Reverse Money Laundering

Discover what reverse money laundering is, how it works, its impact on crime and the economy, real-world examples, and strategies businesses can use to detect and prevent it.

Risk Assessment

Risk assessment is the systematic process of evaluating the potential risks that may be involved in a projected activity or undertaking. To assess the risks, different tools and methods can be...

Risk Management

Risk management describes the process and practices of companies in attempting to prevent malicious or fraudulent activity from occurring within their systems, as well as addressing any other issues...

Risk-Based Authentication (RBA)

What is risk-based authentication? Risk-based authentication (RBA) is a non-static authentication system that takes into account the profile (IP address, User-Agent HTTP header, time of access, and...

Romance Scams

Discover how romance scams work, their emotional and financial impact, and how to protect yourself. Learn key signs, recent statistics, and effective strategies to stay safe online.

Rules Engine

Discover how Rules Engines automate complex decision-making, boost efficiency, and enhance fraud detection across industries. Learn key benefits, challenges, use cases, and top tools in this guide.

Rules-Based Fraud Detection

Rules-based fraud detection identifies fraud based on a set of unusual attributes, including unusual time stamps, account numbers, transaction types, and amounts, among other criteria. How...

Run Of Network (Ron)

Discover the essentials of Run Of Network (RON) advertising—its benefits, challenges, use cases, and tips for maximizing brand reach and fraud protection in today’s digital marketing landscape.

S

SCA (Strong Customer Authentication)

SCA is defined as “an authentication based on the use of two or more elements categorized as knowledge (something only the user knows), possession (something only the user possesses) and inherence...

SEO

SEO is an abbreviation for Search Engine Optimization, which is the art of having your website optimized, or attractive, to the major search engines for optimal indexing. It refers to the process of...

SERP

Search Engine Results Pages (SERP) are the pages displayed by search engines in response to a query by a searcher. The main component of the SERP is the listing of results that are returned by the...

SIM Swapping

Discover how SIM swapping threatens your digital security, the risks involved, and practical steps you and mobile carriers can take to prevent identity theft, financial loss, and account takeovers.

Sales Scam

Discover how sales scams work, their impact on consumers, and ways to protect yourself and your business from fraud. Learn key tactics, prevention tips, and recent statistics in this insightful guide.

Sanctions and Watch Lists

Sanctions and Watch Lists are critical tools used by governments, international organizations, and regulatory bodies to maintain global security, enforce compliance, and deter illegal activities.

Sarbanes-Oxley Act (SOX)

Discover how the Sarbanes-Oxley Act (SOX) strengthens corporate governance, boosts financial transparency, and protects investors with strict compliance standards and enhanced accountability.

Scammer

The term scam refers to fraudulent schemes in which goods and money are taken from unsuspecting persons, generally through the deceit of the victim.

Scams

A fraudulent scheme performed by a dishonest individual, group, or company in an attempt to obtain money or something else of value. Scams traditionally resided in confidence tricks, where an...

Scareware

Discover what scareware is, how it tricks users with fake alerts, the risks it poses, and practical tips to protect yourself and your business from these deceptive cyber threats. Stay informed and secure!

Scholarship Scam

Learn how to spot and avoid scholarship scams, protect your personal information, and find legitimate financial aid opportunities with our expert tips and recent statistics. Stay safe while pursuing your dreams!

Scraper

Discover how web scrapers automate data collection, their key benefits, legal considerations, and real-world uses—from fraud detection to market research—in this comprehensive guide for businesses.

Script Kiddie

Curious about Script Kiddies? Learn how these inexperienced hackers use pre-made tools, the risks they pose, common attack methods, and ways organizations can protect themselves.

Second Party Fraud

Second party fraud, or money mules, is where a person allows another to use their identity or personal information to perform fraud. Businesses may find second party fraud difficult to detect and...

Secure Element

Discover how Secure Elements safeguard sensitive data in payment, ID, and IoT systems with tamper-resistant hardware, boosting security and trust in today’s digital world. Learn more in our latest article!

Securities and Exchange Commission (SEC) Rules

Discover how SEC rules ensure transparency, protect investors, and regulate U.S. securities markets, plus recent updates, real-world use cases, and modern compliance solutions.

Security Protocol

Security protocol, also called cryptographic protocol, could be described as a sequence of operations that ensure the protection of data. Used with a communications protocol, it provides secure...

Security Threat and Risk Assessment

Security Threat and Risk Assessment can be defined as a technique that classifies the overall business and security risks with the aim of defining the competence of security controls, together with...

Security Token

A security token is a physical device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to...

Self-Learning Fraud Prevention Systems

Discover how self-learning fraud prevention systems use AI to adapt, detect, and reduce fraud in real time—enhancing security and streamlining operations for businesses across industries.

Sensitive Data

Sensitive data is defined as information that is protected against unwarranted disclosure. Access to sensitive data must be safeguarded. Protection of sensitive data may be required for legal or...

Serious Fraud Office (SFO)

The Serious Fraud Office (SFO) is a non-ministerial government department of the Government of the United Kingdom that investigates and prosecutes serious or complex fraud and corruption in England,...

Shell Companies

Discover what shell companies are, how they operate, and the risks and regulations surrounding them. Learn how to spot misuse and protect your business from fraud in our latest guide!

Shopping Cart

Discover how shopping carts enhance online shopping, improve security, and impact e-commerce success. Learn key features, use cases, and tips to boost your digital shopping experience!

Shoulder Surfing

Discover how to protect your sensitive information from shoulder surfing—a common security risk in public places. Learn prevention tips, real-world examples, and effective solutions in this guide.

Sim Cloning

Discover what SIM cloning is, its security risks, real-world fraud cases, and how to protect yourself. Learn about rising threats and effective solutions to stay safe in today’s digital world.

Single sign-on

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. SSO can be used by...

Skimmer

Skimmers are essentially malicious card readers attached to real payment terminals so that they can harvest data from every person that swipes their cards. The typical ATM skimmer is a small device...

Skimming

Discover how skimming helps you quickly identify key ideas in texts and learn about its role in combating payment card fraud, with expert tips and insights for readers and compliance professionals alike.

Skimming Attacks

Discover how skimming attacks steal card data at ATMs, POS terminals, and online checkouts, plus tips and tools to protect yourself and your business from this growing threat.

Skimming Cash Receipts

Discover how skimming cash receipts threatens business integrity, how it’s detected, and proven ways to prevent it—essential tips for protecting your company from this common form of fraud.

Smart Card

Discover how smart cards enhance security, streamline digital transactions, and protect data across various industries. Learn about their features, uses, and future trends in this comprehensive guide.

Smart Contract Fraud

Explore how smart contract fraud happens, common schemes, recent stats, and practical steps to protect yourself in the evolving world of blockchain-based contracts. Stay informed and secure!

Smishing

Discover how "smishing" scams use SMS to steal personal info, why they’re rising, and practical tips to protect yourself and your business from these deceptive mobile phishing attacks.

Smurfing/Structuring

The process of laundering money by breaking up large funds into multiple bank accounts to operate under the radar of law enforcement agencies.  In the gaming industry, the term refers to players who...

Sniffing

Discover the basics of network sniffing—how it works, its uses, risks, and security measures. Learn how to protect your data and why monitoring network traffic is crucial for cybersecurity.

Social Engineering

Discover how social engineering exploits human psychology in cyberattacks, the latest tactics used by attackers, real-world examples, and practical steps to protect yourself and your organization.

Social Media

Social media is a large platform where people entertain, communicate, and connect with the world. It consists of different social networking sites which can be used by hackers and fraudsters to steal...

Social Media Intelligence

Discover how Social Media Intelligence empowers businesses to analyze trends, enhance marketing, detect fraud, and make smarter decisions using real-time data from social platforms.

Social Media Phishing

Learn how social media phishing works, the risks it poses, real-world scams, and prevention tips to protect yourself and your business from online threats. Stay safe with expert insights and strategies!

Social Media Tracking

Social media tracking or monitoring is a process of using social media channels to track, gather and mine the information and data of certain individuals or groups, usually companies or...

Social Security Fraud

Social Security fraud usually occurs when an unauthorized third-party gains access to an individual's Social Security number and exploits it for their own financial benefit.

Social Security Number (SSN)

A Social Security number (SSN) is a nine-digit number that the U.S. government issues to all U.S. citizens and eligible U.S. residents who apply for one. The government uses this number to keep track...

Software Piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries....

Spam

Spam refers to an irrelevant or inappropriate message sent on the Internet to a large number of recipients. These messages are often used by scammers to trick people into providing their personal...

Spear Phishing

Spear phishing describes when phishing is done with specific targets in mind; this allows messages to these people to appear more legitimate, or as if they are being sent by a legitimate user. For...

Spider

Discover how web spiders power search engines, aid in fraud prevention, and learn fascinating facts about spiders—from their role online to their place in nature—in this informative, easy-to-read guide.

Spoofs

A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls.

Spyware

Spyware is software that can be installed on a computer system or computer device without the device user's knowledge. The software allows the installer to directly obtain or convert information from...

State-sponsored Fraud

Discover what state-sponsored fraud is, how it operates, real-world examples, recent statistics, and practical solutions for detection and prevention in this comprehensive, easy-to-understand guide.

Statute of Limitations

A statute of limitations is a law that sets the maximum time the parties involved have to initiate legal proceedings from the date of an alleged offense, whether civil or criminal. However, cases...

Stealing

Stealing is the action that occurs when someone takes possession of another person's identity, posessions, or information without any legal rights and without any permission, without any intention of...

Stealing or providing business secrets

Stealing business secrets is the act of accessing a business's confidential information and revealing it to people who are not properly authorized to see that information. Intellectual property theft...

Subscription Billing Fraud

Discover how subscription billing fraud happens, its impact, and practical ways to protect yourself and your business from unauthorized charges and hidden fees in today's digital subscription landscape.

Supervised Machine Learning

Supervised machine learning is the machine learning task of learning a function that maps an input to an output based on example input-output pairs. It infers a function from labeled training data...

Supply Chain Fraud

Discover how supply chain fraud impacts businesses, common fraud types, key prevention strategies, and recent stats—plus how technology like AI can help protect your operations and reputation.

Suspicious Activity Monitoring

Discover what Suspicious Activity Monitoring is, why it’s crucial for financial security, and how modern tools help detect and prevent fraud. Learn key stats, use cases, and expert insights inside!

Suspicious Transaction Report (STR)

Learn what Suspicious Transaction Reports (STRs) are, why they're crucial for fighting financial crime, and how businesses can streamline compliance and detection in today’s evolving regulatory landscape.

Sweepstakes Scam

Learn how to spot and avoid sweepstakes scams! Discover common tactics scammers use, real-world examples, and tips to protect yourself and your business from these fraudulent schemes.

Sweetheart Scam

A sweetheart scam is a situation where a scammer will pretend to be romantically interested in somebody, with the intention of learning their personal information so that they may commit fraud with...

Swindling

The term 'swindler' refers to a person who takes advantage of others through deceit. Swindling occurs when a person defrauds another, causing the victim to suffer damage through unfaithfulness or...

Synthetic Business Fraud

Discover how synthetic business fraud threatens financial systems by blending real and fake data. Learn its impact, detection challenges, and how to protect your business in this essential guide.

Synthetic Data

Discover how synthetic data—artificially generated to mimic real-world data—enhances AI, ensures privacy, and powers innovation, with real-world use cases and the latest market trends.

Synthetic Identity

Discover how synthetic identities blend real and fake data to commit fraud, their impact on financial systems, detection challenges, and how businesses can defend against this growing threat.

Synthetic Identity Creation

Discover how synthetic identity creation blends real and fake data to commit fraud, its impact on banks and consumers, and the latest trends, risks, and prevention strategies in this insightful guide.

Synthetic Identity Fraud

Discover how synthetic identity fraud blends real and fake info to create false identities, the risks it poses to financial institutions, and tips to protect yourself in our latest blog post.

Synthetic Transactions

Discover how synthetic transactions—simulated user actions—help monitor, secure, and optimize applications, playing a key role in performance, fraud detection, and compliance for modern businesses.

System Integrator

Discover how System Integrators unify diverse technologies for seamless operations, tackle integration challenges, and boost fraud prevention—plus key stats and FAQs for businesses of all sizes.

T

Tax Identity Theft

The term "tax identity theft" represents fraud made by someone to get advantages in tax returns and tax payments. Tax-related identity theft occurs when someone uses your stolen Social Security...

Tech Support Scams

Discover how tech support scams work, common tactics used by fraudsters, recent stats, and practical tips to protect yourself and your data from these increasingly sophisticated threats.

Technology Theft

Discover what technology theft is, its impacts on businesses, and how to protect your innovations from unauthorized use with practical tips, real examples, and the latest industry statistics.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line