Riskopedia
All Things Fraud & Credit Risk

Your go-to resource for clear, concise definitions and explanations of key terms and concepts in fraud and credit risk management
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cyber Security and Emerging Fraud

Link Analysis

Link analysis is a fraud detection technique that examines relationships and connections between digital entities to uncover patterns indicative of fraudulent behavior.

Financial Fraud

Loan Application Fraud

Loan Application Fraud is the submission of false information on a loan application to fraudulently obtain funds or favorable terms, such as overstating income or hiding existing debts.

Cyber Security and Emerging Fraud

Machine Reasoning

Machine reasoning simulates human-like reasoning and decision-making, enabling machines to interpret data, infer conclusions, and solve complex problems.

Account Security Fraud

Man-in-the-middle Attacks

Man-in-the-middle (MitM) attacks are cyberattacks where an attacker secretly intercepts and relays messages between two parties.

Financial Fraud

Manual Review

Manual reviews involve human analysts evaluating flagged transactions or activities to determine their legitimacy when automated fraud detection systems cannot provide a clear verdict.

Account Security Fraud

Masquerade Attack

A masquerade attack is a cybersecurity breach where attackers impersonate legitimate users or systems to gain unauthorized access to resources or data.

Financial Fraud

Money Laundering

Money Laundering is the process of disguising the origins of illegally obtained money, making it appear as though it originated from a legitimate source

Account Security Fraud

Money Mule Scam

Money Mule Scam is a form of fraud where individuals are recruited, often unknowingly, to transfer stolen money or goods on behalf of others.

Financial Fraud

Online Banking Fraud

Online Banking Fraud is when criminals use the internet to illegally remove or transfer money from one bank account to another, involving tactics like phishing, hacking, or malware.