Study guide 21 Flashcards Preview

detective test > Study guide 21 > Flashcards

Flashcards in Study guide 21 Deck (15)
Loading flashcards...
0
Q

Churning

A

The practice of convincing customers to use the cash of old insurance policies to pay premiums on new , more expensive policies

1
Q

Bank secrecy act

A

Federal law passed in 1970 to require reporting of large scale case transactions.

2
Q

Computer virus

A

A set of computer instructions that reproduces itself into computer programs when they are executed within Unauthirized programs

3
Q

Confidence game

A

The criminal practice of gaining the confidence of a would be victim for the soil porpoise of swindling money from them.
Art of getting something for nothing by stealing from a trusting person

4
Q

Cybercrime

A

The destruction, theft, or Unauthirized use , modification it copying of information , programs , services , equipment or communication networks

5
Q

Cyber extortion

A

When a computer criminal extorts money from a victim

6
Q

Data didling

A

False data entry

7
Q

Hacker

A

A computer programmer who explored tests and pushes the computer to its limits regardless of the consequences

8
Q

Masquerading

A

The process of one person assuming the identity of an authorized computer user by acquiring items , knowledge , or characteristics.
The most common activity of computer system intruders

9
Q

Pigeon drop

A

A commonly used confidence game

example - found wallet split proceeds both Parties put up case out of their pocket. Victim never gets there share

10
Q

Pyramid scheme

A

Commonly used confidence game
Example - you put in money recruit 2 others to put in money. U get ur money back. And they have two recruit two more people

11
Q

Scanning

A

The process of presenting sequentially changing info to an automated system to identity those items receiving a positive response.

12
Q

Smurfing

A

When money launders go to different banks and purchase cashiers checks I’m denominations less than 10,000$ for the purpose of bypassing reporting requirements

13
Q

Software

A

A medium in which information is stored

14
Q

Trojan horse

A

Is the secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

An unauthorized computer program which automatically transfers money to an illegal account whenever a legal transaction is made

Decks in detective test Class (121):