Safeguarding Customers and the Bank

Edit Answers
KEYSTROKETRACKINGHPZ EMBEZZLEMENTZPWRCOBE TRPKMDMBWWPTZAYCHTUK MONEYLAUNDERINGDASKC TAMRZSCWSVWTUDJRUPHR TKYTMQZHCCIJTEGOTOJD AJGQUFQBYKFPMMEWHTDR SIFVUDWXCTISVIRSEDUO OVVPASSPHRASECASNUAT PRETEXTCALLINGWATRRC WHISTLEBLOWERUYPIMFA MALWAREXTEPQHVPVCAEF LCONTINGENCYQZSWAPFI INTERNALAUDITORWTSUT INFORMATIONSECURITYL SLYNEBIOMETRICSBORGU ESECURITYTOKENYVNAPM EXTERNALAUDITORBBJJL CIVILMONEYPENALTYFVM UINSIDERFRAUDXVIRUSM
1.
A program for ensuring that data and technology systems are not accessed by unauthorized users.
2.
Arbitrary string of 6 to 10 characters chosen by or assigned to a user to authenticate the user attempting to logon to a computer system.
3.
Arbitrary string of up to 100 characters similar to, and used like, a password but that provides more security.
4.
Determination that a message comes from a source authorized to originate the message; a measure designed to protect against a fraudulent transmission by establishing the validity of a transmission, message, station, or person.
5.
A physical device that communicates with a computer, either by direct attachment or wireless communication, to confirm a person’s identity for the purpose of performing authorized transactions.
6.
Authentication by two or more of the following: something the user has, is, or knows.
7.
Automated methods of identifying a person based on a physiological or behavioral characteristic such as voice, fingerprint, or typing pattern.
8.
Unsolicited junk emails sent to a large number of people to promote products or services or to spread computer viruses.
9.
Attempts to use the phone to gain access to another’s account information by pretending to be the account holder or an authorized signer on the account.
10.
Evaluate a bank’s internal control and risk management systems; ensure the safeguarding and proper recording of bank assets; and verify compliance with laws, regulations, and established bank policies and practices.
11.
Typically focus on financial reporting and associated processes and matters that relate to a bank’s financial statements.
12.
An employee who reports fraud or other wrongdoing within a company.
13.
A fine imposed by a civil court on an individual, business, or organization that has profited from illegal or unethical activity or has violated a law or regulation.
14.
An intentional misrepresentation made by one person to another who, believing the misrepresentation, takes some action and suffers a loss of property or a right to the first person.
15.
A crime involving the fraudulent use or keeping of money or other property that has been entrusted to one’s care; also known as misappropriation of funds.
16.
Fraud perpetrated by someone who works inside an organization.
17.
“Malicious” and “software”; broadly applies to viruses, Trojan Horses, worms, and any other software programs designed to damage computers and computer systems.
18.
A software program capable of reproducing itself that usually causes great harm to files or other programs on the same computer.
19.
Computer software that collects personal information about users without their informed consent.
20.
The practice of monitoring the keys struck on a computer keyboard, often done covertly to obtain passwords and other protected information.
21.
Short for wireless fidelity; a radio frequency standard that is used to connect devices, such as computers, together using a wireless connection.
22.
aAn area that allows computers equipped with wireless fidelity to receive internet connection.
23.
A business ___________ plan is created for maintaining or resuming business operations should unexpected events occur.
24.
A disease spread over a large geographical region and affecting a large proportion of the population.
25.
Moving large amounts of illegally obtained cash through many bank accounts or to other legal investment or assets in order to hide the source of the money.
26.
A comprehensive plan for reacting to threats to the security of a bank’s data, systems, employees, or facilities.