Study guide 21 Flashcards

1
Q

Churning

A

The practice of convincing customers to use the cash of old insurance policies to pay premiums on new , more expensive policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer virus

A

A set of computer instructions that reproduces itself into computer programs when they are executed within Unauthirized programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidence game

A

The criminal practice of gaining the confidence of a would be victim for the soil porpoise of swindling money from them.
Art of getting something for nothing by stealing from a trusting person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrime

A

The destruction, theft, or Unauthirized use , modification it copying of information , programs , services , equipment or communication networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber extortion

A

When a computer criminal extorts money from a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data didling

A

False data entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacker

A

A computer programmer who explored tests and pushes the computer to its limits regardless of the consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Masquerading

A

The process of one person assuming the identity of an authorized computer user by acquiring items , knowledge , or characteristics.
The most common activity of computer system intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pigeon drop

A

A commonly used confidence game

example - found wallet split proceeds both Parties put up case out of their pocket. Victim never gets there share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pyramid scheme

A

Commonly used confidence game
Example - you put in money recruit 2 others to put in money. U get ur money back. And they have two recruit two more people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scanning

A

The process of presenting sequentially changing info to an automated system to identity those items receiving a positive response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Smurfing

A

When money launders go to different banks and purchase cashiers checks I’m denominations less than 10,000$ for the purpose of bypassing reporting requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software

A

A medium in which information is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horse

A

Is the secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

An unauthorized computer program which automatically transfers money to an illegal account whenever a legal transaction is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bank secrecy act

A

Federal law passed in 1970 to require reporting of large scale case transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly