Riskopedia
All Things Fraud & Credit Risk

Your go-to resource for clear, concise definitions and explanations of key terms and concepts in fraud and credit risk management
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cyber Security and Emerging Fraud

SSL Inspection

SSL inspection is the process of decrypting, analyzing, and re-encrypting HTTPS traffic to detect potential threats, such as malware or data breaches, while ensuring secure communication.

Financial Fraud

Second Party Fraud

Second party fraud occurs when a legitimate user willingly participates in or facilitates fraudulent activities, often for personal gain or under coercion.

Regulatory

Security Audits

A systematic evaluation of an organization’s security policies, systems, and controls to identify vulnerabilities, ensure compliance with regulations, and assess the overall effectiveness of security measures.

Account Security Fraud

Session Hijacking

Session hijacking is a type of cyberattack where an attacker takes over a user’s session with a web service, allowing unauthorized access to the user’s account.

Account Security Fraud

Social Engineering

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables.

Cyber Security and Emerging Fraud

Social Media Profiling

Social media profiling involves collecting and analyzing an individual’s publicly available social media data to create a detailed profile, often for marketing or fraud prevention.

Regulatory

Source of Funds

Source of Funds (SoF) refers to the origin of financial assets used in a transaction, typically verified to ensure legality and compliance with anti-money laundering (AML) regulations.

Account Security Fraud

Synthetic Identity Fraud

Synthetic identity fraud is a deceptive practice where fraudsters combine real and fake personal information to construct a new, fictitious identity for financial aims.

Financial Fraud

Third Party Fraud

Third party fraud occurs when an unauthorized individual uses another person’s credentials, identity, or payment information without their knowledge to commit fraud.