click below
click below
Normal Size Small Size show me how
id theft
identity theft
| Term | Definition |
|---|---|
| Spyware | a type of malicious software (malware) that secretly installs on computers or mobile devices to monitor user activity, steal sensitive data—such as passwords, banking information, and personal communications—and transmit it to third parties |
| Dumpster Diving | salvaging discarded items—ranging from food and clothes to electronics and furniture—from commercial or residential waste containers |
| Firewall | a part of a computer system or network which is designed to block unauthorized access while permitting outward communication |
| Forgery | forgery is the crime of creating, altering, or imitating documents, signatures, or objects with the intent to defraud. It often involves signing another's name, forging handwriting, or altering legal documents |
| Fraud | knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment |
| Identity Theft | the fraudulent acquisition and use of a person's private identifying information, usually for financial gain |
| Peer-to-Peer (P2P) | A peer-to-peer (P2P) network is a decentralized communications model where individual computers ("peers" or nodes) connect directly to share resources, files, or data without relying on a central server. |
| Phishing | the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
| Shoulder Surfing | a social engineering technique where an attacker observes a victim’s screen, keyboard, or conversations in public to steal sensitive information like passwords, PINs, or credit card numbers |
| Snail Mail | slang for physical mail delivered by traditional postal services |
| Scams | deceptive tactics used to steal money or personal information, frequently impersonating authorities or businesses, creating fake emergencies, or demanding immediate payment via gift cards, crypto, or wire transfers |
| Anti-Virus Software | Antivirus software is essential security software that detects, prevents, and removes malware—including viruses, ransomware, and spyware—to protect devices and personal data |
| Better Business Bureau | a private, nonprofit organization founded in 1912 that promotes marketplace trust by evaluating businesses, charities, and nonprofits |
| Federal Trade Commission | The Federal Trade Commission (FTC) is an independent U.S. agency, founded in 1914, dedicated to protecting consumers and promoting competition by preventing unfair, deceptive, or anticompetitive business practices. |
| Equifax | Equifax is one of the "Big Three" nationwide credit reporting agencies—along with Experian and TransUnion—that collects, analyzes, and maintains consumer financial data |
| TransUnion | Transunion is one of the "Big Three" nationwide credit reporting agencies—along with Experian and Equifax—that collects, analyzes, and maintains consumer financial data |
| Experian | Experian is one of the "Big Three" nationwide credit reporting agencies—along with Equifax and TransUnion—that collects, analyzes, and maintains consumer financial data |
| Internal Revenue Service | The Internal Revenue Service (IRS) is the U.S. government agency responsible for administering and enforcing federal tax laws, including collecting income, gift, estate, and excise taxes. |
| Solicitations | the act of asking for or trying to obtain something from someone |
| Spam | a brand of canned, pre-cooked lunch meat made by Hormel Foods, consisting of pork with ham, salt, water, potato starch, sugar, and sodium nitrite |