Financial Transactions - Consumer Fraud Flashcards

0
Q

What is a block hustle?

202

A

A scheme in which the purveyor sells imitation or stolen goods on the street

purveyor = Händler
hustle = Hast, Hektik
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is an advance-fee swindle?

201

A

A swindle structured to obtain an illegal gain by falsely promising the delivery of a product or a service in exchange for an upfront fee.

Vorauskasse-Schwindel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an advertising scheme?

203

A

A scheme in which a fraudster sells ficticious advertising space, such as in a nonexistent magazine or telephone directory

Anderes Beispiel:
Firmeneinträge aufgrund von HR-Publikationen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a scavenger scheme?

204

A

A scheme in which a previously conned victim is targeted for an advance fee by a bogus company that claims to assist fraud victims in recovering stolen money

bogus = betrügerisch
scavenger = Lumpensammler, Aasgeier, Müllsammler etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Affinity fraud?

205

A

Fraud that targets people who share social connection (e.g. religiouos groups, racial minorities, professional organisations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are factoring companies?

206

A

Organisations that buy credit card receipts at a discount and use their merchant bank accounts to convert the receipts into cash

factoring = Aufkauf von Forderungen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a fronter?

207

A

An employee involved in a telemarketing scam who calls victims to make the initial sales pitch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a closer?

208

A

A veteran employee involved in a telemarketing scam to whom interested callers are transferred and that convinces the person to buy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is verifier?

209

A

An employee involved in a telemarketing scam who reads vague words about the deal and records the victim’s agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Ponzi scheme?

210

A

an illegal business practice in which new investors’ money is used to make payments to earlier investors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an illegal pyramid?

211

A

A scheme in which the bulk of the earnings are dependent on money brought in from new recruits with an emphasis on advancing to ever higher stages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shoulder surfing?

212

A

A method used by identity thieves to optain information by overhearing conversations or covertly observing the input of credit card numbers, account information, or PIN codes into machines or documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is turnkey?

213

A

An individual or entity that provides telemarketing scammers with autodialers, phone lists, credit card receipts, and merchandise they require to operate

turnkey = Türöffner (in diesem Zusammenhang)
Liefert Daten von möglichen Opfern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is password cracking?

214

A

An automated process by which an attacker attempts to guess a system user’s password

= Passwort-Knacken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is social engineering?

215

A

A method for gaining unauthorised access to a system or to information in which the attacker deceives victims into disclosing personal information or convinces them to committ acts that facilitate the attacker’s intended scheme

to deceive = täuschen irreführen
“direkt im sozialen Kontakt, Informationen und persönliche Informationen herausholen”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing?

216

A

A method used for gaining unauthorised access to a computer system in which a perpetrator dupes an individual or business into providing sensitive data, such as passwords or account numbers, by falsely claiming to be from an actual business, bank, ISP, or other entity in which the target does business

perpetrator = Eindringling, Täter
to dupe = einseifen, übertlisten, übertölpeln

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SMiShing?

217

A

A type of phishing attack in which the fraudster uses text messages or other short message services to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or orther entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is pharming?

218

A

An attack in which a user is fooled into entering sensitive data (such as password or credit card number) into a malicious website that impersonates a legitimate website.

to impersonate = sich als jemanden ausgeben
malicious = hinterhältig, bösartig

Abgrenzung zum Phishing? Ist es nur das Medium? Web vs. eMail, SMS etc.?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the piggybacking method used to gain access to restricted areas?

219

A

A method in which the attacker exploits a false association with another person who has legitimate access to the area

piggybacking = huckepack machen
Sich im Huckepack an jemanden dranhängen, um Zutritt zu erhalten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is malware?

220

A

An umbrella term used to describe any kind of malicious software, including viruses, worms, trojans, spyware and botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is spyware?

221

A

A type of software that collects and reports information about a computer user without the user’s knowlwdge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a trojan horse?

222

A

A programme or command procedure that gives the appearance of being useful but in fact contains hidden code that causes malicious damage

malicious = arglistig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is acomputer worm?

223

A

A malicious self-replicating computer programme that penetrates operating systems to spread malicious code to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are keyloggers?

224

A

Software or hardware tools that monitor and log (or track) the keys pressed on a system’s keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

5 information security goals for e-commerce systems

225

A

confidentiality of data (Vertraulichkeit)
integrity of data (Datenintegrität, Unversehrtheit)
availability of data (Datenverfügbarkeit)
authentication (authentifizierung)
non-repudiation (unleugbarkeit, nachweislich der Wahrheit entsprechend)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is e-commerce?

226

A

The process whereby 2 or more parties make business transactions via computer and some type of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is authentication (in the context of e-commerce systems)?

227

A

The validation of a customer’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a non-repudiation (in the context of e-commerce systems)?

228

A

A guarantee that the parties involved in an e-commerce transaction cannot repudiate (deny) participation in the transaction

= Protokoll für Nachweisbarkeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are physical access controls?

229

A

Controls that allow or restrict users’ access to physical objects or areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is vishing?

230

A

The act of leveraging Voice over Internet Protocol (VoIP) to falsely claim to be a legitimate enterprise in an attempt to scam users into disclosing personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is spear phishing?

231

A

Phishing attacks that target a specific organisation in which messages that falsely appear to originate from within the organisation (e.g., from the IT or HR department) are sent to the entity’s employees in order to obtain the employees’ usernames and passwords to access the corporate network.

spear = Speer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is rock phishing?

232

A

Phishing attacks that employ botnets to send massive amounts of phishing emails to huge volumes of internet users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a firewall?

233

A

A device that blocks unauthorised or unverified access to network assets by surveying incoming and outgoing transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are logical access controls?

234

A

Controls that allow or restrict users’ access to computer systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is encryption?

235

A

The deliberate scrambling of a message so that it is unreadable except to those who hold the key for unscrambling the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is an intrusion detection system?

236

A

A device or software application that monitors an organisation’s inbound and outbound network activity and identifies any suspicious patterns of activity that might indicate a network or system attack or security policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are sniffers?

237

A

Computer programmes that monitor traffic on areas of a network and search for packets of data a they pass through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a trapdoor (in the context of information security)?

238

A

A secret entry point into a programme that allows someone who is aware of the trapdoor to gain access without going through the usual security access proceures

trapdoor = falltür

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is spoofing?

239

A

The process whereby a person or programme masquerades as another to obtain unauthorised access to a targeted system

39
Q

What is input manipulation (or data diddling)?

240

A

Entering false or misleading information into a system to achieve a specific fraudulent purpose

diddling = schwindeln

40
Q

What is data leakage?

241

A

The unauthorised transmission of data from within an organisation to an outside destination

41
Q

what is privilege escalation?

242

A

The act of exploiting a bug, design flaw, configuration oversight, or other vulnerability in an operating system or software application to gain access that is beyond the user’s authorised access level

42
Q

What is a logic bomb?

243

A

Code embedded in alegitimate programme that is set to activate (or explode) and set off a malicious function when certain conditions are met

43
Q

What is a botnet?

244

A

A group of Internet-connected computers that interact to accomplish a distributed task

44
Q

What is logging or journaling (in the context of computer security)?

245

A

The process of making a record of system-related events or logs for analysis

45
Q

What is a penetration test?

246

A

An examination in which a group of trusted individuals tests an entity’s network security by attempting to breach it

46
Q

What is crimeware?

247

A

Malware used to simplify or automate online criminal activities in order to obtain financial gain from the affected user or other third parties

47
Q

4 phases of the contracting phase

248

A

the presolicitation phase
the solicitation phase
the bid evaluation and award phase
the post-award and administration phase

solicitation = Angebotseinholung

48
Q

What happens in the presolicitation phase of the contracting process?

249

A

The procuring entity:

  • identifies its needs
  • develops the bid specifications
  • determines the method to use for acquiring the goods or services
  • develops teh criteria used to award the contract
49
Q

What happens in the solicitation phase of the contracting phase?

250

A
  • the procurement entity prepares the solicitation document
  • the procurement entity provides notices of solicitation
  • the procurement entity issues the solicitation document
  • the bidders prepare and submit their bids or proposals
50
Q

What happens in the bid evaluation and award phase of the contracting process?

251

A

the procuring entity:

  • evaluates the bids or proposals
  • selects the winning bid or proposal
51
Q

What happens in the post-award and administration phase of the contracting process?

252

A

The contracting parties fulfil their respective duties through the performance of their contractual obligations

52
Q

What are need recognition schemes?

253

A

Schemes in which a procurement employee convinces his employer, the purchasing entity, that it needs excessive or unnecessary products or services

53
Q

What are bid-tailoring schemes?

254

A

Schemes in which an employee with procurement responsiblities, often in collusion with a contractor, drafts bid specifications in a way that gives an unfair advantage to a certain contractor

collusion = betrügerische Absprache

54
Q

What are bid manipulation schemes?

255

A

Schemes in which a procuring employee restricts the pool of competitors from whom bids are sought in order to benefit a favoured contractor or supplier

55
Q

What is complementary bidding?

(also known as protective, shadow or cover bidding)

256

A

A scheme in which competitors submit token bids that are not serious attempts to win the contract

Verstehe ich dies richtig?: Es handelt sich um fake-Angebote, welche die Spezifikationen nicht erfüllen, damit das passende eigene Angebot genommen wird?

56
Q

What are bid rotation (or bid pooling) schemes?

257

A

Schemes in which 2 or more contractors conspire to alternate the business between them on a rotating basis

57
Q

What is bid suppression?

258

A

A scheme in which 2 or more contractors enter an illegal agreement whereby at least 1 of the conspirators refrains from bidding or withdraws a previously submitted bid.

suppression = unterdrückung
to refrain = unterlassen, von etwas Abstand halten

58
Q

What are market division schems?

259

A

Schemes in which competitors agree to divide and allocate markets among themselves and to refrain from competing in each other’s designated portion of the market.

59
Q

What is defective pricing *in the procurement context)?

260

A

A fraud scheme in which contractors intentionally use inaccurate cost or pricing data to inflate costs related to negotiated contracts.

60
Q

What is non-conforming goods or services fraud?

261

A

A fraud scheme in which aa contractor delivers goods or services to the procuring entity that do not conform to the underlying contract specifications

61
Q

What are cost mischarging schemes?

262

A

Schemes in which a contractor charges the procuring entity for costs that are not allowable, not reasonable, or cannot be allocated to the contract directly or indirectly

62
Q

3 types of mischarges in cost mischarging schemes

263

A
  • accounting mischarges
  • material mischarges
  • labour mischarges
63
Q

Elements of a legal contract between 2 entities

264

A
  • lawful subject matter or objective
  • competent parties
  • intent to be legally bound
  • agreement
  • form permitted by law

(Eine wirklich gute und interessante definition)

64
Q

What is a contract?

265

A

A mutual oral or written agreement between 2 or more parties

65
Q

What is a breach of contract?

266

A

When a party to a contract fails to perform, or announces that it does not intend to perform, without just cause.

66
Q

What are bid-splitting schemes?

267

A

Schemes in which an employee of a procuring entity breaks a large project up in several smaller projects that fall below the mandatory bidding level, allowing the entity to avoid competitive methods of procurement

67
Q

What is competitive bidding using sealed bids?

268

A

A method of procurement in which prospective contractors submit competitive, sealed bids containing price and term to a procurement entity who awareds the contract to the bidder with the best price.

68
Q

What is contracting by negotiation?

269

A

A method of procurement that permits bargaining between the procuring entity and prospective contractors before the contract is awarded

69
Q

What is sole-source contracting?

270

A

A noncompetitive procurement process in which the procuring entity solicits only 1 prospective contractor

70
Q

What is purchasing card (or p-card)?

271

A

A company charge card that allows goods and services to be purchsed without using a traditional procurement process

71
Q

What are bid specifications?

272

A

A list of elements, measurements, materials, characteristics, required functions, and other specific information detailing the goods and services that a procuring entity needs from a contractor

72
Q

What is a change order?

273

A

A written agreement between the procuring entity and the contractor to make changes in a signed contract

73
Q

What is change order abuse?

274

A

A performance scheme in which a corrupt contractor submits a low bid to ensure that it wins the contract award and then increases its price with subsequent change orders after the procuring entity awards in the contract

74
Q

What is a third-party payer health care system?

200

A

A health care system in which a third party (e.g., an insurance company or health care programme) pays the health care provider (i.e., the second party) for the care or services provided to the patient (i.e., the first party)

75
Q

What is a direct-payment healtch care system?

199

A

A health care system in which patients pay directly from their own funds for health care services

76
Q

What occurs during a phantom service health care fraud scheme?

179

A

Providers bill for services that were not rendered at all

77
Q

What occurs during a clinical lab health care fraud scheme?

180

A

A provider advises a patient that additional medical testing is needed to diagnose the problem when it is not required or advisable

78
Q

What occurs during a fictitious provider health care fraud scheme?

181

A

Criminals or corrupt providers fraudulently use another provider’s identification information and patient identifying infromation to bill health care programmes for services that were not performed

79
Q

What parties are considered medical “providers”

182

A
  • medical practitioners
  • medical suppliers
  • medical institutions
80
Q

What is reusable medical equipment?

183

A

Reusable equipment for a medical purpose, such as crutches, wheelchairs, and specialised patient beds

81
Q

Who is responsible for paying medical insurance co-payments and deductibles (in programmes that require them)?

184

A

Patients

82
Q

Common kickbacks in the healtch care industry

185

A
  • payments for referrals of patients
  • waivers of deductible and co-payments
  • payments for insurance contracts on health care programmes
  • payments for vendor contracts
deductibles = Selbstbehalt
wwaiver = Verzichtserklärung/Aufhebung
83
Q

What is unbundling?

186

A

Separating a comrehensive medical procedure code into separate components to increase charges

84
Q

What is upcoding?

187

A

Billing for a higher level of medical service than the actual service rendered

85
Q

What is diagnostic-related grouping (DRG)?

188

A

A reimbursement methodology for the payment of institutional claims that categorises patients who are medically related with respect to various types of information, such as primary and secondary diagnosis, age, gender, weight, length of stay, and complications

86
Q

What is DRG creep?

189

A

When medical staff members manipulate diagnostic and precedural codes in a pattern to increase reimbursement amounts

87
Q

Most common methods providers use to inflate health care billings

190

A
  • alterations
  • added services
  • code manipulation
88
Q

What are medical ICD codes?

191

A

International Classification of Diseases (ICD) codes that are used to classify diseases and related health problems.

89
Q

What group commits the most incidents of health fraud?

192

A

Providers

90
Q

Common health care fraud schemes in which hospitals are primarily involved

193

A
  • filing of false cost reports
  • DRG creep
  • billing for experimental procedures
  • improper contractual and other relationships with physicians
  • revenue recovery firms to (knowingly or unknowingly) bill extra charges
91
Q

What happens in a “rent-a-patient” health care fraud scheme?

194

A

A provider or other party PAYS individuals to undergo unnecessary medical procedures that are then billed to the patient’s health care programme

92
Q

What is episode-of-care reimbursement in health care?

195

A

A health care payment method in which providers receive one lump sum for all the services they provide related to a condition or desease.

= Fallpauschale

93
Q

What is capitation reimbursement in health care?

196

A

A health care payment method in which providers receive one lump sum for every patient they see, regardless of how many services the provider renders.

94
Q

What is a fee-for-service reimbursement in health care?

197

A

A health care payment method in which providers receive payments for each individual service rendered

95
Q

What is a single-payer health care system?

198

A

A health care system in which the government pays providers on behalf of the patients who receive health care services