Chapter Twelve

Industry-Related Fraud Opportunities

ANSWERS: FILL IN THE BLANKS

1. Money laundering
2. detailed record
3. data management
4. risk profiling, transactional
5. continuous monitoring, computerized
6. appropriate authorities, significant penalties
7. personal privacy
8. authenticated
9. signature, authentic signature, verification
10. Online authentication
11. negligence, intent
12. personal identification number (PIN)
13. check digit, Luhn check
14. CNP, magnetic strip
15. biometric authentication
16. physical characteristics, facial recognition geometry
17. change
18. card not present
19. merchant, disputes
20. Check fraud
21. Counterfeiting
22. proper authorization
23. closed, paperhanging
24. Check kiting
25. chemicals, solvents, fabrication
26. knowledge, awareness, alertness
27. lower
28. Wire transfers, instantaneous transfer
29. not intended, authorized individual
30. business, government, consumer
31. nondispersing
32. paycheck, routing number
33. direct debits
34. convenience, lower costs
35. identities, credentials
36. Shoulder surfing
37. public, confidential, valuable
38. Keystroke loggers, screen images
39. man-in-the-middle, account information
40. Phishing, bank
41. Pharming
42. impersonation
43. botnets, malware
44. Fast flux DNS
45. certificate, secure connection
46. encryption
47. wireless network, no traffic
48. Wi-Fi Protected Access 2 (WPA2)

Get Corporate Fraud and Internal Control Workbook: A Framework for Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.