100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

CAFP Fraud Study Set

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
14-04-2024
Written in
2023/2024

CAFP Fraud Study Set

Institution
CAFP
Course
CAFP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CAFP
Course
CAFP

Document information

Uploaded on
April 14, 2024
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CAFP Fraud Study Set
Fraud Risk Factors Answer - Fraud event, customer experience and regulatory compliance
Fraud Levers Answer - Prevention, Detection, Response
First Party Fraud Answer - Individual who unjustly profits from fraud or misuse of account in own identity at the bank
Third Party Fraud Answer - Occurs when someone other than the applicant or account owner is responsible for fraud behavior
Fraud Management Program Answer - Exposure to fraud varies based on geographic concentrations, product (convenience, diversity), weak controls
Fraud Policy Answer - Establish your bank's posture relative to fraud (#1 of 6 Anti Fraud Fundamental)
Fraud Identification Answer - Effort must be placed on pulling fraud out of hidden places (#2 of 6 Fraud Fundamental)
Fraud Prevention & Detection Answer - Stop the incident, reduce the severity (#3 of 6 Fraud Fundamental)
Training & Awareness Answer - Feeds ID program, faster detection, deterrence (#4 of 6 Fraud Fundamental)
Response Answer - What to do when an event happens, best established in advance. (#5 of 6 Fraud Fundamental)
Portfolio Management Answer - Routines you use to effectively manage this loss type (#6 of 6 Fraud Fundamental)
Elements of Fraud Detection Framework Answer - Fraud Policy, Identification, Prevention & Detection, Training & Awareness, Response, Portfolio Management
PII (Personally identifiable information) Answer - Identity information such as full name, SSN, address, personal characteristics, linkable information (DOB, religion, etc) True Name Fraud Answer - Criminals represent them self as the consumer, using the exact PII of the victim. Hard to detect.
Synthetic Identity Answer - Do not use full PII of an individual, may use all fictitious or combination of real and fake.
Account Takeover Answer - Criminal use stolen credentials or PII to gain access or call Call Center and identify themselves as victim.
Social Engineering Answer - Attempt to extract sensitive data from humans.
Data Compromise Answer - Criminals harvest data from computer or other sources.
Pretext Call Answer - Pretend to be someone else
Phishing Answer - Social engineering in which criminals force emails from seemingly legitimate business to trick recipients into divulging PII or other account credentials.
Phreaking Answer - attacking phone systems to obtain free phone line access, use phone lines to transmit malware, and to access, steal, and destroy data
Spear Phishing Attack Answer - Phishing attacks that target large groups of people. the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information
Whaling Answer - targeted to senior business executives and government leaders
Pharming Answer - A phishing attack that automatically redirects the user to a fake site.
Vishing Answer - Phishing attacks committed using telephone calls or VoIP systems.
Smishing Answer - Phishing attacks committed using text messages (SMS).
Dumpster Diving Answer - The act of digging through trash receptacles to find information that can be useful in an attack.
Mass Data Compromise Answer - Hundreds, thousands or millions of records are hacked from databases.
Malware Answer - software that is intended to damage or disable computers and computer systems.
Red Flags Rule Answer - Promulgated under FACTA, the Red Flags Rule requires certain financial entities to develop and implement identity theft detection programs to identify and respond to "red flags" that signal identity theft.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
5018
Member since
4 year
Number of followers
3557
Documents
52255
Last sold
1 day ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.9

915 reviews

5
438
4
160
3
166
2
46
1
105

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions