قائمة المصطلحات

اختبر القوة المثبتة لحلول رؤية الكمبيوتر لدينا بنفسك في بضع خطوات بسيطة.

Search Icon Close Icon

A

Account Takeover (ATO)

Account Takeover (ATO) occurs when unauthorized individuals gain control over user accounts using phishing, keyloggers, or malware. Protect against ATO attacks with strong authentication, unique passwords, and advanced security tools.

يتعلم أكثر

Account Takeover Fraud

Prevent unauthorized access to online accounts & safeguard personal information with strong passwords, authentication, monitoring, & anti-fraud tools.

يتعلم أكثر

Account Validation Service

Account Validation Service verifies user-provided information for account creation or changes, preventing fraud and ensuring data integrity. Enhance security and maintain accurate user data.

يتعلم أكثر

Active Liveness Detection

Enhance security & accuracy in biometric systems with active liveness detection. Verifies real-time presence & prevents impersonation. Detects dynamic facial movements to prevent spoofing attacks.

يتعلم أكثر

Address Card

An address card is a compact and organized representation of an individual's contact information, typically including their name, phone number, and address.

يتعلم أكثر

Address Risk

Address risk refers to vulnerability and exposure at a specific location, including natural disasters, crime rates, and proximity to danger. Assessing it helps make informed decisions and allocate resources effectively for safety and resilience. #AddressRisk

يتعلم أكثر

Address Verification Service

Address Verification Service (AVS) validates customer address info for e-commerce & credit card transactions. Enhances security & prevents fraud.

يتعلم أكثر

Advance Fee Fraud

Advance Fee Fraud, exemplified by the Nigerian Prince scam, deceives victims into paying upfront fees or providing personal info under false pretenses.

يتعلم أكثر

Adverse Media Screening

Adverse Media Screening: Identify risks by analyzing news, social media, and legal data. Protect reputation, comply with regulations, and make informed business decisions. Advanced technology tools used for searching and analyzing vast amounts of data.

يتعلم أكثر

Age Verification

Ensure legal compliance, protect vulnerable individuals, and prevent minors from accessing age-restricted content or services. Use various methods like ID checks, third-party services, and age estimation algorithms for robust age verification.

يتعلم أكثر

Age-restricted Purchases

Age-restricted Purchases: Transactions involving products or services that are legally restricted to be sold only to individuals above a certain age.

يتعلم أكثر

AI-powered

AI-powered refers to technologies, systems, or devices that utilize artificial intelligence to enhance their capabilities, performance, or functionality.

يتعلم أكثر

Alien ID

Alien ID: Official identification document issued to non-citizens residing or visiting a country, providing legal recognition and verifying their immigration status.

يتعلم أكثر

Alien Passport

The Alien Passport is an official document issued by a country to non-citizens, granting them legal identification and temporary residency status.

يتعلم أكثر

AML Audit

AML Audit examines and evaluates an organization's Anti-Money Laundering program for compliance with laws, preventing illicit activities. Enhance controls, mitigate risks, and maintain financial system integrity. Required for transparency and safeguarding against financial crime.

يتعلم أكثر

Anomaly Detection

Boost your SEO with anomaly detection - Identify outliers, errors, fraud, and unusual events in data using statistical methods and machine learning algorithms. Essential for cybersecurity, finance, healthcare, and more!

يتعلم أكثر

Anonymised Data

Anonymised data refers to information that has been stripped of identifying details, ensuring the identities of individuals cannot be determined.

يتعلم أكثر

Anti-Money Laundering (AML)

Anti-Money Laundering (AML) refers to regulations and procedures aimed at preventing illicit funds from disguising as legitimate money. It helps combat financial crimes like terrorism financing and corruption, ensuring the integrity of the financial system. Compliance is mandatory for banks and institutions.

يتعلم أكثر

Anti-Money Laundering (AML) Regulators by Country

Discover the primary AML regulators worldwide: FinCEN in the US, FCA in the UK, AUSTRAC in Australia, FIU in Singapore, FSC in South Korea, and FSA in Japan.

يتعلم أكثر

Application Fraud

Application fraud is intentional deception on applications to gain benefits. It occurs in finance, insurance, employment, and government. Verify information to prevent fraud.

يتعلم أكثر

Area Under the Curve (AUC)

The Area Under the Curve (AUC) is a metric used in statistics and machine learning to assess binary classification models' performance. Learn more here.

يتعلم أكثر

Artificial Intelligence (AI)

Discover the power of Artificial Intelligence (AI) in revolutionizing industries, automating tasks, and enhancing decision-making capabilities. Learn more about machine learning, natural language processing, computer vision, and robotics.

يتعلم أكثر

Attack Vectors

Discover the various methods attackers use to exploit system vulnerabilities & gain unauthorized access. Mitigate attack vectors with effective security measures.

يتعلم أكثر

Authentication

Securely verify user identity, grant access to resources, and maintain system security with authentication. Protect sensitive information with trusted credentials.

يتعلم أكثر

Auto-Approval

Automate approval processes, streamline operations, and reduce manual intervention with auto-approval systems. Increase efficiency and reduce costs.

يتعلم أكثر

Auto-Decision

Streamline decision-making with auto-decision systems powered by AI. Improve efficiency, accuracy, and reduce costs in finance, healthcare, and more. Stay transparent and accountable.

يتعلم أكثر

B

Bad Actor

Protect integrity, security & fairness from bad actors engaging in unethical practices. Safeguard against fraud, corruption & data breaches - crucial for all domains.

يتعلم أكثر

Bank Drop

Discover the dark world of bank drops, a method used by criminals to receive illicit funds through legitimate bank accounts, hiding their true source and minimizing detection.

يتعلم أكثر

Bank Secrecy Act (BSA)

Learn about the Bank Secrecy Act (BSA), a federal law in the US aimed at preventing money laundering and financial crimes. Discover its requirements and importance.

يتعلم أكثر

Banking as a Service (BaaS)

Enhance customer experience and build innovative financial solutions with Banking as a Service (BaaS). Seamlessly integrate banking services into your platform.

يتعلم أكثر

Barcode Scanning

Barcode scanning technology enables efficient and accurate identification, tracking, and management of products, improving operational efficiency and customer satisfaction.

يتعلم أكثر

Behavior-Based Fraud Analysis

Detect and prevent fraud with behavior-based analysis. Analyze behavioral patterns and use advanced analytics to identify suspicious activities.

يتعلم أكثر

Behavioral Analytics

Gain insights and make informed decisions with behavioral analytics. Track user behavior, optimize strategies, and enhance user experiences. Drive growth with data-driven decisions.

يتعلم أكثر

Beneficial Ownership

Discover the importance of beneficial ownership in finance, business, and property law. Learn how it helps identify true stakeholders and ensures transparency.

يتعلم أكثر

Biometric

Biometric refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints or voice patterns, for identification or authentication purposes.

يتعلم أكثر

Biometric Passport

Discover the benefits of a biometric passport – a highly secure and tamper-proof travel document with an electronic chip containing encrypted biometric information for efficient and safe international travel.

يتعلم أكثر

Biometric Verification

Enhance security and prevent identity fraud with biometric verification. Confirm individual's identity using unique physical or behavioral characteristics.

يتعلم أكثر

Border Crossing Card

The Border Crossing Card is a travel document issued by the US government for Mexican citizens to enter the US for specific purposes, such as tourism or business.

يتعلم أكثر

Bot

Boost productivity & save time with bots, automated software applications that simulate human interactions & perform tasks in various domains.

يتعلم أكثر

Business Email Compromise (BEC)

Protect your business from cyber scams with Business Email Compromise (BEC) awareness. Implement security measures and educate employees to stay safe.

يتعلم أكثر

Bust Out

Bust Out: A deliberate and forceful escape from confinement. Involves physical force, clever strategies, and sometimes violence. Illegal and actively prevented by authorities.

يتعلم أكثر

C

California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) grants California residents rights over their personal information, including the right to know, delete, and opt out of data collection and sales. Improving consumer privacy and control.

يتعلم أكثر

Card Not Present Fraud (CNP)

Learn about Card Not Present Fraud (CNP) - unauthorized online, phone, or mail-order transactions without card present. Find out security measures to mitigate risk.

يتعلم أكثر

Carding

Carding: Verifying stolen card data for malicious use. Carders obtain details from underground markets or data breaches to validate and sell for fraud.

يتعلم أكثر

CEO Fraud

CEO fraud (BEC) is a cyber attack where fraudsters impersonate a CEO to deceive employees into taking unauthorized actions, leading to financial losses and compromise of sensitive data.

يتعلم أكثر

Challenge-Response Authentication

Challenge-Response Authentication verifies identity by exchanging challenges and responses, enhancing security against replay attacks.

يتعلم أكثر

Chargeback

Chargeback: A customer-initiated reversal of a card payment, used for consumer protection in cases like fraud or non-delivery. Merchants may face penalties.

يتعلم أكثر

Check Fraud

Check fraud is the manipulation of checks for illegal gain, including forgery, alteration, counterfeit checks, and unauthorized use, posing a threat to individuals, businesses, and financial institutions.

يتعلم أكثر

Children’s Online Privacy Protection Act (COPPA)

COPPA is a US law protecting online privacy of children under 13. It sets guidelines for websites collecting personal data, ensures parental consent, and allows control over information. FTC enforces compliance.

يتعلم أكثر

Citizenship Certificate

A Citizenship Certificate is an official document that confirms an individual's citizenship status in a particular country.

يتعلم أكثر

Clean Fraud

Clean fraud: Financial fraud using real information. Perpetrators use stolen or fake identities to bypass security measures and make unauthorized transactions. Difficult to detect.

يتعلم أكثر

CNP Fraud (Card Not Present)

CNP fraud: Unauthorized transactions made using card details without physical presence. Businesses employ security measures to combat and protect against monetary losses.

يتعلم أكثر

Compliance

Adhere to laws, rules, and standards with compliance. Ensure ethical boundaries, mitigate risks, and protect stakeholders' interests.

يتعلم أكثر

Compliance Officer

A Compliance Officer ensures adherence to policies, laws, and regulations, mitigating risks and promoting ethical practices for an organization.

يتعلم أكثر

Computer Vision

Explore the field of computer vision, an AI discipline focused on enabling machines to interpret visual information from digital images or videos. Learn about algorithms and applications.

يتعلم أكثر

Consular ID

A Consular ID is an official identification document issued by a foreign government to its citizens residing or traveling abroad.

يتعلم أكثر

Consumer Financial Protection Bureau (CFPB)

The Consumer Financial Protection Bureau (CFPB) promotes fairness and accountability in the financial marketplace, protecting consumers and enforcing regulations.

يتعلم أكثر

Continuous Monitoring

Proactively analyze real-time data to detect risks, vulnerabilities, and breaches. Improve security, comply with regulations, and stay ahead of threats.

يتعلم أكثر

Conversion Rates

Conversion Rates: The percentage of website visitors who complete a desired action, such as making a purchase or filling out a form.

يتعلم أكثر

Credential Stuffing

Prevent unauthorized access & data breaches with unique passwords & multi-factor authentication. Learn about the risks of credential stuffing.

يتعلم أكثر

Credit Card Fraud

Unauthorized use of credit card details for fraudulent transactions. Learn about methods, consequences, and security measures to protect yourself.

يتعلم أكثر

Cross-Channel Fraud

Cross-channel fraud: Exploiting vulnerabilities in online and offline channels for fraudulent activities. Learn how to protect your business and customers.

يتعلم أكثر

Customer Churn

Customer Churn refers to the rate at which customers cease to do business with a company or unsubscribe from its services.

يتعلم أكثر

Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is a process that financial institutions use to verify and assess the risk associated with their customers.

يتعلم أكثر

Customer Identification Program (CIP)

Customer Identification Program (CIP) is a mandatory process conducted by financial institutions to verify and authenticate the identity of their customers.

يتعلم أكثر

Customer Identity & Access Management (CIAM)

Customer Identity & Access Management (CIAM) refers to the process of managing and securing customer identities and their access to digital resources.

يتعلم أكثر

Customer Onboarding

Customer Onboarding is the process of guiding and familiarizing new customers with a product or service to ensure a smooth transition and positive experience.

يتعلم أكثر

Customer Risk Profiling

Customer Risk Profiling: The process of evaluating and assessing the level of risk associated with a customer to determine their suitability for a particular product or service.

يتعلم أكثر

D

Dark Web

The Dark Web is a hidden part of the internet that is not indexed by search engines and is often associated with illegal activities.

يتعلم أكثر

Data Breach

A data breach is the unauthorized access, disclosure, or loss of sensitive information, such as personal data or trade secrets, by a third party.

يتعلم أكثر

Data Capture Automation

Data Capture Automation is a process of automating the collection, extraction, and processing of data from various sources, reducing manual efforts and improving efficiency.

يتعلم أكثر

Data Entry Automation

Data Entry Automation: The process of utilizing software or systems to automatically input, validate, and manipulate data with minimal human intervention.

يتعلم أكثر

Data Extraction

Data Extraction: The process of collecting and retrieving specific data from various sources, such as databases or websites, for analysis or storage.

يتعلم أكثر

Data Protection Act 2018

The Data Protection Act 2018 is a UK law that safeguards individuals' personal data, ensuring it is processed lawfully and securely.

يتعلم أكثر

Debit Card Fraud

Debit Card Fraud: Unauthorized use of a debit card to make fraudulent transactions, often resulting in financial loss for the cardholder.

يتعلم أكثر

Deepfake

Deepfake: A deceptive technique that uses artificial intelligence to create manipulated videos or images, often replacing a person's face with another's, resulting in highly realistic but fabricated content.

يتعلم أكثر

Demand Deposit Account (DDA) Fraud

DDA Fraud is a deceptive practice involving unauthorized access or manipulation of funds in a demand deposit account, often through cyberattacks or identity theft.

يتعلم أكثر

Device Fingerprinting

Device Fingerprinting is the process of uniquely identifying and tracking devices based on their distinctive characteristics, such as hardware, software, or network configurations.

يتعلم أكثر

Device Risk

Device Risk refers to the potential threats or vulnerabilities associated with electronic devices, including the risk of data breaches, malware attacks, and unauthorized access.

يتعلم أكثر

Digital Certificate

A digital certificate is an electronic document that verifies the authenticity and integrity of digital information, ensuring secure online communication.

يتعلم أكثر

Digital Footprint

Digital Footprint: The trail of information left by an individual's online activity, including social media posts, browsing history, and online interactions.

يتعلم أكثر

Digital Forgery

Digital Forgery: Falsification or alteration of digital content, such as photos or documents, with the intent to deceive or mislead.

يتعلم أكثر

Digital Identity

Digital Identity refers to the online representation of an individual or entity's personal information, activities, and interactions on the internet.

يتعلم أكثر

Digital Manipulation

Digital Manipulation: The alteration or modification of digital images using software tools to enhance, correct, or create visual content.

يتعلم أكثر

Digital Onboarding

Digital onboarding is the process of integrating new users into a digital platform or service, ensuring a seamless and efficient experience.

يتعلم أكثر

Digital Passport

A Digital Passport is an electronic document that verifies a user's identity online, allowing them to securely access various digital services and platforms.

يتعلم أكثر

Digital Tampering

Digital Tampering: Unauthorized manipulation or alteration of digital content, such as images or documents, with the intent to deceive or mislead.

يتعلم أكثر

Digital Trust

Digital Trust is the confidence in the reliability, integrity, and security of digital technologies and online interactions.

يتعلم أكثر

DNI – Documento Nacional de Identidad

DNI, short for "Documento Nacional de Identidad," is a compulsory identity document issued to citizens in Spain and some other countries, encapsulating personal details like name, photo, and date of birth for official identification purposes.

يتعلم أكثر

Document Capture

Document Capture refers to the process of digitally capturing and converting physical or electronic documents into a searchable and editable format.

يتعلم أكثر

Document Type Recognition

Document Type Recognition is the process of automatically identifying and classifying different types of documents based on their content and layout.

يتعلم أكثر

Document Verification

Document verification is the process of confirming the authenticity and validity of a document, typically through comparisons with trusted sources or by using advanced technologies.

يتعلم أكثر

Driver Card

The Driver Card is a small identification card issued to licensed drivers, providing proof of their driving privileges and personal information.

يتعلم أكثر

Drivers License

A government-issued document that grants individuals legal permission to operate motor vehicles on public roads.

يتعلم أكثر

Drop Address

The drop address is a specific location where packages or items are delivered or picked up, often different from the sender's or recipient's address.

يتعلم أكثر

Drop-off Rates

Drop-off Rates: The percentage of users who leave a website or app after visiting only one page or without completing a desired action.

يتعلم أكثر

E

Egmont Group

The Egmont Group is an international organization of financial intelligence units that collaborate to combat money laundering and terrorist financing.

يتعلم أكثر

Email Risk

Email Risk: Potential dangers or vulnerabilities associated with the transmission, storage, and access of electronic messages via email platforms.

يتعلم أكثر

Employment Pass

The Employment Pass is a work visa issued by certain countries that allows foreign professionals to work and reside in the country for a specified period.

يتعلم أكثر

Emulator

An emulator is a software or hardware that enables a computer system to imitate and run programs or operating systems designed for a different device or platform.

يتعلم أكثر

Enhanced Due Diligence (EDD)

Enhanced Due Diligence (EDD) is a thorough investigation process that involves gathering additional information to assess higher-risk customers or transactions.

يتعلم أكثر

Entity Resolution

Entity Resolution is the process of identifying and merging duplicate records or entities within a dataset to ensure data quality and consistency.

يتعلم أكثر

EU eIDAS Regulation

EU eIDAS Regulation: EU regulation that establishes a framework for electronic identification and trust services in the European Union.

يتعلم أكثر

European Banking Authority (EBA)

The European Banking Authority (EBA) is an EU agency that ensures the effective and consistent regulation and supervision of banking activities within the European Union.

يتعلم أكثر

European Securities and Markets Authority (ESMA)

ESMA is a European regulatory body overseeing securities and markets, ensuring investor protection, stability, and transparency in the EU financial system.

يتعلم أكثر

e

eKTP

eKTP is Indonesia's electronic ID system launched in 2011, streamlining access to public services, government transactions, and voting applications for over 172 million citizens through smart card and biometric technologies.

يتعلم أكثر

eKYC

eKYC is an electronic process that allows individuals to verify their identity and authenticate themselves digitally, eliminating the need for physical documents.

يتعلم أكثر

F

Facial Matching

Facial Matching: The process of comparing and analyzing facial features to determine whether two or more facial images belong to the same person.

يتعلم أكثر

Facial Recognition

Facial Recognition is a technology that identifies and verifies individuals by analyzing unique facial features, used for security and authentication purposes.

يتعلم أكثر

Fake Check Scams

Fake Check Scams: Fraudulent schemes where victims receive counterfeit checks, are instructed to deposit them, and then send money back to scammers before banks discover the fraud.

يتعلم أكثر

False Negative

False Negative: A result that incorrectly indicates the absence of a condition or attribute, despite it actually being present.

يتعلم أكثر

False Positive

False Positive: An incorrect result that indicates a condition or event is present when it is not.

يتعلم أكثر

False Positive Ratio

The False Positive Ratio is the proportion of incorrect positive results among all positive results obtained in a test or system.

يتعلم أكثر

Federal Trade Commission (FTC)

The Federal Trade Commission (FTC) is a government agency in the United States responsible for promoting consumer protection and preventing unfair business practices.

يتعلم أكثر

Financial Action Task Force (FATF)

The Financial Action Task Force (FATF) is an intergovernmental organization that sets global standards to combat money laundering and terrorist financing.

يتعلم أكثر

Financial Conduct Authority (FCA)

The Financial Conduct Authority (FCA) is a regulatory body in the UK that ensures financial markets are fair, transparent, and consumers are protected.

يتعلم أكثر

Financial Crime

Financial Crime refers to illegal activities involving deceit, fraud, or manipulation of financial systems, resulting in monetary loss or illegal gains.

يتعلم أكثر

Financial Crimes Enforcement Network (FinCEN)

FinCEN is a U.S. government agency that combats money laundering, terrorist financing, and other financial crimes through data analysis and regulation.

يتعلم أكثر

Fingerprint Scan

Fingerprint scan is a biometric authentication method that uses unique patterns on a person's fingertips to verify their identity.

يتعلم أكثر

First Payment Default (FPD)

First Payment Default (FPD) refers to the failure of a borrower to make the initial payment on a loan or credit agreement.

يتعلم أكثر

First-Party Fraud

First-Party Fraud: Occurs when individuals deceive a business using their own identity to obtain goods, services, or money through fraudulent means.

يتعلم أكثر

Fraud Alert

Fraud Alert: A warning or notification that is issued to protect individuals or organizations from potential fraudulent activities or identity theft.

يتعلم أكثر

Fraud Analytics

Fraud Analytics is the practice of using data analysis techniques and algorithms to detect and prevent fraudulent activities within a system or organization.

يتعلم أكثر

Fraud Detection

Fraud Detection refers to the process of identifying and preventing dishonest or deceptive activities, such as financial scams or identity theft.

يتعلم أكثر

Fraud Investigation

Fraud Investigation is the process of examining and uncovering fraudulent activities or deceptive behavior to gather evidence for legal action or prevention measures.

يتعلم أكثر

Fraud Management System

A Fraud Management System is a software solution designed to detect, prevent, and mitigate fraudulent activities within an organization's operations.

يتعلم أكثر

Fraud Prevention

Fraud Prevention refers to measures and techniques implemented to detect, deter, and mitigate fraudulent activities, protecting individuals and organizations from financial losses and reputational damage.

يتعلم أكثر

Fraud Ring

A fraud ring is a network of individuals collaborating to engage in illegal activities, such as identity theft or financial scams, for personal gain.

يتعلم أكثر

Fraud Score

The 'Fraud Score' is a numerical value that assesses the likelihood of fraudulent activity, providing a measure to detect and prevent potential fraud.

يتعلم أكثر

Fraud Triangle (Pressure, Opportunity, Rationalization)

The Fraud Triangle (Pressure, Opportunity, Rationalization) is a concept that explains the factors that typically lead individuals to commit fraudulent acts.

يتعلم أكثر

Fraudulent Transaction

Fraudulent Transaction: An unauthorized or dishonest activity involving the deceitful use of funds or assets for personal gain or illegal purposes.

يتعلم أكثر

Friction

Friction is the resistance encountered when two objects rub against each other, resulting in a force that opposes their relative motion.

يتعلم أكثر

Friendly Fraud

Friendly Fraud: A deceptive practice where a customer disputes a legitimate transaction, resulting in chargebacks, often due to forgetfulness or intentional abuse.

يتعلم أكثر

Fullz

Fullz: Refers to a complete set of stolen personal information, including name, address, social security number, and credit card details, sold on the dark web.

يتعلم أكثر

Fuzzy Matching

Fuzzy Matching: A technique used to find approximate matches between similar but not identical strings of text or data.

يتعلم أكثر

G

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a set of regulations that governs the protection and processing of personal data within the European Union.

يتعلم أكثر

Ghost Employee (a fake identity on a company’s payroll)

A ghost employee is a fictitious identity listed on a company's payroll, typically used for fraudulent purposes or embezzlement.

يتعلم أكثر

Global Entry Card

The Global Entry Card is a travel document issued by the U.S. government that grants expedited clearance for pre-approved, low-risk travelers at airports and land borders.

يتعلم أكثر

Global Watchlist

The Global Watchlist is a comprehensive database of individuals or entities subject to scrutiny due to potential risks or suspicious activities worldwide.

يتعلم أكثر

H

Healthcare Fraud

Healthcare Fraud: Illegitimate activities committed by individuals or organizations to deceive or defraud healthcare systems for personal or financial gain.

يتعلم أكثر

Heuristic Analysis

Heuristic Analysis: Evaluating the usability of a product or system by identifying and uncovering potential design flaws and user experience issues.

يتعلم أكثر

I

Identity Access Management (IAM)

Identity Access Management (IAM) is a system that manages and controls user access to resources, ensuring security and reducing unauthorized access risks.

يتعلم أكثر

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is a cloud-based solution that enables businesses to manage user identities and access privileges securely and efficiently.

يتعلم أكثر

Identity Document Verification

Identity Document Verification: Process of confirming the authenticity and accuracy of a person's identification documents, such as passports or driver's licenses.

يتعلم أكثر

Identity Fraud

Identity Fraud: The deliberate use of someone else's personal information without their consent to commit crimes or fraudulent activities.

يتعلم أكثر

Identity Fraud Detection and Prevention Software

Identity Fraud Detection and Prevention Software: A tool that identifies and prevents unauthorized use of personal information, mitigating the risk of identity theft and fraud.

يتعلم أكثر

Identity Fraud Detection in Banking

Identity Fraud Detection in Banking: Process of identifying and preventing fraudulent activities involving the theft or misuse of personal information in banking transactions.

يتعلم أكثر

Identity Graph

The Identity Graph is a database that associates and links individuals' data across different devices and platforms, creating a unified profile.

يتعلم أكثر

Identity Proofing

Identity Proofing is the process of verifying a person's identity by collecting and validating their personal information and credentials.

يتعلم أكثر

Identity Theft

Identity Theft: Unauthorized acquisition and misuse of personal information, such as social security numbers or bank account details, for fraudulent purposes.

يتعلم أكثر

Identity Verification

Identity Verification: The process of confirming an individual's identity, often through the use of personal information, documents, or biometric data.

يتعلم أكثر

Identity Verification Service Provider (IVSP)

An Identity Verification Service Provider (IVSP) is a company that offers solutions for confirming the authenticity and accuracy of individuals' identities.

يتعلم أكثر

Image Capture Application

An Image Capture Application is a software program that enables users to capture, edit, and save images from various sources, such as cameras or scanners.

يتعلم أكثر

Image Pre-processing

Image pre-processing is the initial step in image analysis where raw images are enhanced or transformed to improve their quality and suitability for further analysis.

يتعلم أكثر

Image Processing

Image processing is the manipulation and analysis of digital images to enhance or extract useful information, using algorithms and computer systems.

يتعلم أكثر

Image Quality Assessment (IQA)

IQA is the evaluation of the overall visual fidelity and perceived quality of an image, typically based on metrics and algorithms.

يتعلم أكثر

In-browser SDK

In-browser SDK is a software development kit that allows developers to create and integrate web applications directly within a web browser.

يتعلم أكثر

Indian IT Act (2000)

The Indian IT Act (2000) is a legislation that governs electronic transactions, data protection, and cybersecurity in India.

يتعلم أكثر

Insider Trading

Insider Trading: Illegal practice of trading stocks or securities based on non-public information obtained by individuals within a company.

يتعلم أكثر

Insurance Fraud

Insurance Fraud: Deliberate deception to obtain financial gain from insurance companies by submitting false claims or inflating the value of legitimate claims.

يتعلم أكثر

International Monetary Fund (IMF) – Financial Integrity Group

The International Monetary Fund (IMF) - Financial Integrity Group is a department that promotes and monitors global financial integrity and transparency.

يتعلم أكثر

Interpol

Interpol is an international organization that facilitates global police cooperation to combat crime, terrorism, and other cross-border threats.

يتعلم أكثر

Invoice Fraud

Invoice Fraud is a deceptive practice where scammers create fake invoices or manipulate existing ones to trick individuals or businesses into making unauthorized payments.

يتعلم أكثر

ISO Certifcation

ISO Certification is a globally recognized accreditation that certifies an organization's compliance with international standards for quality management systems.

يتعلم أكثر

K

Know Your Customer (KYC)

KYC (Know Your Customer) is a process used by businesses to verify the identity and assess the risk of clients before engaging in a business relationship.

يتعلم أكثر

Knowledge Based Authentication (KBA)

Knowledge Based Authentication (KBA) is a security method that verifies a person's identity by asking them questions only they should know the answers to.

يتعلم أكثر

L

Liveness Detection

Liveness Detection is a biometric technology that verifies the presence of a live person by distinguishing real faces from fake ones.

يتعلم أكثر

Loan Fraud

Loan Fraud: Deceptive practices involving misrepresentation or falsification of information to obtain a loan, often resulting in financial losses for lenders.

يتعلم أكثر

Lottery or Prize Scam

Lottery or Prize Scam: a fraudulent scheme where individuals are deceived into believing they have won a lottery or prize, often resulting in financial loss.

يتعلم أكثر

M

Machine Learning (ML)

Machine Learning (ML) is a branch of artificial intelligence (AI) that enables computers to learn from and make predictions or decisions without explicit programming.

يتعلم أكثر

Machine Readable Zone (MRZ)

The Machine Readable Zone (MRZ) is a section on official documents, such as passports, that contains encoded personal information for automated scanning.

يتعلم أكثر

Mail Fraud

Mail Fraud: A criminal offense that involves using the postal system to deceive or defraud individuals or businesses.

يتعلم أكثر

Manual Review

Manual Review: A process of evaluating and analyzing information or transactions by human reviewers instead of relying solely on automated systems.

يتعلم أكثر

Marketplace Fraud

Marketplace Fraud: Deceptive activities involving online marketplaces where sellers or buyers engage in illegal or dishonest behavior to manipulate or exploit the platform.

يتعلم أكثر

Mobile Payment Fraud

Mobile Payment Fraud: Unauthorized or fraudulent transactions made using mobile payment platforms, exploiting vulnerabilities in mobile devices or payment systems.

يتعلم أكثر

Mobile Proxy

A mobile proxy is a server that acts as an intermediary between a mobile device and the internet, allowing for anonymous and secure browsing on mobile devices.

يتعلم أكثر

Money Laundering

Money Laundering: The illegal practice of making illegally-gained proceeds appear legitimate by disguising their true origin.

يتعلم أكثر

Money Mule

A Money Mule is an individual who transfers illegally obtained funds on behalf of criminals, often unaware of their involvement in money laundering schemes.

يتعلم أكثر

Mortgage Fraud

Mortgage Fraud: Deceptive practices involving misrepresentation or omission of information in a mortgage loan application for personal gain.

يتعلم أكثر

Multi-factor Authentication (MFA)

Multi-factor Authentication (MFA) is a security measure that requires multiple forms of identification to access a system, providing an extra layer of protection.

يتعلم أكثر

MyKad

MyKad, short for "Malaysian Identity Card", is a government-issued identification card for Malaysian citizens

يتعلم أكثر

N

National Institute of Standards and Technology (NIST)

NIST is a federal agency that promotes innovation and industrial competitiveness by developing and applying technology, measurements, and standards.

يتعلم أكثر

New Account Fraud

New Account Fraud is the act of creating unauthorized accounts using stolen or fabricated identities for illicit purposes.

يتعلم أكثر

O

Office for Foreign Assets Control (OFAC)

OFAC is a U.S. government agency that enforces economic sanctions against foreign entities to protect national security and foreign policy interests.

يتعلم أكثر

Office of the Comptroller of the Currency (OCC)

The Office of the Comptroller of the Currency (OCC) is a U.S. federal agency responsible for overseeing and regulating national banks.

يتعلم أكثر

Omnichannel Verificaiton

Omnichannel Verification: A seamless and integrated process that verifies the identity of customers across multiple channels, ensuring a consistent and secure user experience.

يتعلم أكثر

On Device Processing

On Device Processing: The execution of computational tasks and data processing directly on a device, such as a smartphone or computer, without relying on a remote server or internet connection.

يتعلم أكثر

Onboarding

Onboarding is the process of integrating and familiarizing new employees with an organization, its culture, and their roles and responsibilities.

يتعلم أكثر

Online Fraud (or Cyber Fraud)

Online Fraud (or Cyber Fraud) refers to illegal activities conducted on the internet with the intention to deceive or trick individuals or organizations for financial gain.

يتعلم أكثر

Optical Character Recognition (OCR)

OCR is a technology that converts printed or handwritten text into digital format, enabling computers to recognize and process it for various applications.

يتعلم أكثر

Organization for Economic Co-operation and Development (OECD)

The OECD is an international organization that promotes economic growth and social well-being through cooperation and policy recommendations among member countries.

يتعلم أكثر

Out of Wallet Questions (OOW)

Out of Wallet Questions (OOW): Security questions used to verify a user's identity by requesting personal information not commonly known to others.

يتعلم أكثر

P

P2P Fraud

P2P Fraud: Illicit activities that involve the fraudulent use of peer-to-peer (P2P) networks or platforms for financial gain.

يتعلم أكثر

Passive Liveness Detection

Passive Liveness Detection is a method used to verify the authenticity of a user's identity by analyzing biometric traits without active user participation.

يتعلم أكثر

Payment Services Directive 2 (PSD2)

The Payment Services Directive 2 (PSD2) is an EU regulation that aims to regulate payment services and promote competition and innovation in the market.

يتعلم أكثر

Payroll Fraud

Payroll Fraud is the illegal manipulation of financial records or processes related to employee compensation, resulting in unauthorized gains for the perpetrator.

يتعلم أكثر

PDF417

PDF417 هو نوع من الباركود يحتوي على الكثير من البيانات ويستخدم في المعرفات وبطاقات الصعود إلى الطائرة والطرود.

يتعلم أكثر

Peel Chain

The Peel Chain refers to a blockchain scaling solution that enhances the performance and efficiency of transactions by using a multi-layered approach.

يتعلم أكثر

Personal Information Protection and Electronic Documents Act (PIPEDA)

PIPEDA is a Canadian law that governs the collection, use, and disclosure of personal information by private businesses during commercial activities.

يتعلم أكثر

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) refers to any data that can be used to identify an individual, such as their name, social security number, or address.

يتعلم أكثر

Phishing

Phishing is a form of cyber attack where scammers impersonate trustworthy sources to deceive individuals into revealing sensitive information or performing malicious actions.

يتعلم أكثر

Phone Risk

Phone Risk: The potential danger or negative consequences associated with using a mobile phone, such as distractions, privacy breaches, or exposure to harmful radiation.

يتعلم أكثر

Piggybacking

Piggybacking refers to the act of unauthorized access to a wireless network by using someone else's internet connection without their knowledge or permission.

يتعلم أكثر

Politically Exposed Person (PEP) Check

A Politically Exposed Person (PEP) Check is a due diligence process to identify individuals who hold high-profile positions and may pose a higher risk for corruption or money laundering.

يتعلم أكثر

Pollination

Pollination is the transfer of pollen from the male part of a flower to the female part, enabling fertilization and the production of seeds.

يتعلم أكثر

Ponzi Scheme

A Ponzi Scheme is a fraudulent investment operation that pays returns to existing investors using funds contributed by new investors.

يتعلم أكثر

Predictive Analytics

Predictive Analytics is the practice of extracting information from data to forecast future outcomes or behavior, enabling informed decision-making.

يتعلم أكثر

Presentation Attack Detection (PAD)

Presentation Attack Detection (PAD) is the process of identifying and preventing attempts to deceive biometric systems by using fake or altered data.

يتعلم أكثر

Pyramid Scheme

A pyramid scheme is a fraudulent business model that recruits members through a hierarchical structure, where participants make money by recruiting others.

يتعلم أكثر

Q

QR Code Scanning

QR Code Scanning is the process of using a mobile device's camera to scan and decode Quick Response (QR) codes, allowing users to quickly access information, websites, or perform actions.

يتعلم أكثر

R

Red Flags

Red Flags: Warning signs or indicators of potential problems, risks, or suspicious behavior that should be carefully considered or investigated.

يتعلم أكثر

Regulatory Reporting

Regulatory Reporting is the process of submitting accurate and timely financial information to comply with regulations set by governing authorities.

يتعلم أكثر

Rental Scam

Rental Scam: A fraudulent scheme where individuals pose as landlords or agents to deceive potential renters, often requesting payment for fake listings or properties.

يتعلم أكثر

RESTful API

A RESTful API is a web-based application programming interface that follows the principles of Representational State Transfer (REST).

يتعلم أكثر

Return Fraud

Return Fraud: Unauthorized return or exchange of merchandise, typically involving stolen goods or fraudulent receipts.

يتعلم أكثر

Risk Assessment

Risk Assessment: Process of identifying, analyzing, and evaluating potential risks to determine their impact on objectives and develop appropriate responses.

يتعلم أكثر

Risk-Based Authentication (RBA)

Risk-Based Authentication (RBA) is a security method that assesses user behavior and potential threats to determine the level of authentication required.

يتعلم أكثر

Romance Scam

Romance Scam: Fraudulent scheme where individuals manipulate emotions to deceive victims for financial gain.

يتعلم أكثر

S

Sanctions List

A Sanctions List is a compilation of individuals, organizations, or countries subject to restrictions or penalties due to violations of international laws or policies.

يتعلم أكثر

Sanctions Screening

Sanctions Screening is a process of checking individuals or entities against government lists to ensure compliance with regulations and avoid engaging in prohibited activities.

يتعلم أكثر

Securities and Exchange Commission (SEC)

The Securities and Exchange Commission (SEC) is a government agency responsible for regulating and overseeing the securities industry in the United States.

يتعلم أكثر

Securities Fraud

Securities Fraud refers to the illegal practice of deceiving investors by providing false information or engaging in manipulative activities in the securities market.

يتعلم أكثر

Security Features Check (SSF)

%%excerpt%%

يتعلم أكثر

Self-hosted API

A self-hosted API is an application programming interface that is hosted and managed by the user themselves, rather than by a third-party provider.

يتعلم أكثر

Selfie Checks

Selfie Checks are verification processes that require individuals to submit a selfie as proof of identity or to confirm their physical presence.

يتعلم أكثر

Shipping Fraud

Shipping Fraud: A form of fraudulent activity that involves deceiving individuals or businesses during the process of shipping goods, often resulting in financial loss.

يتعلم أكثر

Sigma Fraud Score

Sigma Fraud Score is a numerical measure that assesses the likelihood of fraudulent activity based on specific indicators and patterns.

يتعلم أكثر

Single Frame Liveness Detection

Single Frame Liveness Detection: A method that verifies the authenticity of an individual using a single image, ensuring they are physically present and not a spoof.

يتعلم أكثر

Skimming

Skimming is a reading technique where one quickly glances over a text to get an overall understanding of the main ideas and key points.

يتعلم أكثر

Sleeper Fraud

Sleeper Fraud: A deceptive scheme where fraudulent activity remains dormant or undetected until a later time, causing significant financial harm.

يتعلم أكثر

Smishing (SMS-based phishing)

Smishing is a form of phishing where cybercriminals attempt to deceive individuals by sending malicious messages via SMS or text messages.

يتعلم أكثر

SOC 2 Type 2 Controls

SOC 2 Type 2 Controls refer to the measures and safeguards implemented by organizations to ensure compliance with the SOC 2 Type 2 certification requirements.

يتعلم أكثر

Software Development Kit (SDK)

The Software Development Kit (SDK) is a collection of tools and resources that enables developers to create software applications for a specific platform or framework.

يتعلم أكثر

Spear Phishing

Spear Phishing: A targeted form of cyber attack where individuals or organizations are deceived into revealing sensitive information through personalized and deceptive emails.

يتعلم أكثر

Sponsor Bank

A sponsor bank is a financial institution that supports and oversees the operations of a prepaid card program or other financial services.

يتعلم أكثر

Spoofing

Spoofing is a fraudulent act of impersonating or masquerading as someone else in order to deceive or gain unauthorized access to information or systems.

يتعلم أكثر

Suspicious Activity Report (SAR)

A Suspicious Activity Report (SAR) is a document used to report potentially illegal or suspicious activities to law enforcement agencies.

يتعلم أكثر

Synthetic Identity Fraud

Synthetic Identity Fraud: A type of fraud where thieves create new identities by combining real and fake information to commit financial crimes.

يتعلم أكثر

Synthetic Identity Theft

Synthetic Identity Theft: A form of identity theft where a new identity is created by combining real and fake information to commit fraudulent activities.

يتعلم أكثر

T

Tax Fraud

Tax fraud is the illegal act of intentionally evading or manipulating tax obligations, such as underreporting income or inflating deductions, to avoid paying full taxes.

يتعلم أكثر

Text Extraction

Text extraction is the process of extracting relevant information from text documents, such as extracting data from invoices or extracting keywords from articles.

يتعلم أكثر

The Basel Committee on Banking Supervision (BCBS)

The Basel Committee on Banking Supervision (BCBS) is an international forum that develops banking regulations to promote global financial stability.

يتعلم أكثر

The Joint Money Laundering Steering Group (JMLSG)

The Joint Money Laundering Steering Group (JMLSG) is a UK industry body that provides guidance on anti-money laundering and counter-terrorist financing measures.

يتعلم أكثر

The Payment Card Industry Security Standards Council (PCI SSC)

The Payment Card Industry Security Standards Council (PCI SSC) sets security standards for the protection of cardholder data and promotes secure payment transactions.

يتعلم أكثر

The Wolfsberg Group

The Wolfsberg Group is an association of global banks that works together to develop best practices for anti-money laundering and counter-terrorism financing.

يتعلم أكثر

Thin File

Thin File: A term used to describe a credit report with a limited history, typically due to a lack of credit accounts or recent credit activity.

يتعلم أكثر

Third-Party Identity Fraud

Third-Party Identity Fraud: The unauthorized use of another person's personal information by an individual or entity not directly involved in the original transaction or relationship.

يتعلم أكثر

Transaction Filtering

Transaction Filtering is the process of identifying and sorting transactions based on specific criteria, such as type, amount, or time, for better organization and analysis.

يتعلم أكثر

Transaction Monitoring

Transaction Monitoring is the process of tracking and analyzing financial transactions to detect and prevent fraudulent activities or money laundering.

يتعلم أكثر

Travel or Vacation Scam

A travel or vacation scam refers to fraudulent schemes aimed at deceiving individuals when booking or planning their trips or holidays.

يتعلم أكثر

Triangulation Fraud

A type of fraud where a scammer uses a third party to deceive and exploit a victim, often involving fraudulent transactions or communication.

يتعلم أكثر

Two-factor Authentication (2FA)

Two-factor Authentication (2FA) is an additional layer of security that requires users to provide two different authentication factors to access an account.

يتعلم أكثر

U

Unbanked

The unbanked refers to individuals who do not have access to traditional banking services or do not possess a bank account.

يتعلم أكثر

Underbanked

Underbanked: Individuals or businesses with limited access to traditional banking services and rely on alternative financial solutions.

يتعلم أكثر

Unstructured Documents

Unstructured Documents: Informal and disorganized files lacking a predefined structure, making them difficult to search, analyze, and extract information from.

يتعلم أكثر

USA PATRIOT Act

The USA PATRIOT Act is a US law passed in response to the September 11 attacks, expanding surveillance powers to combat terrorism.

يتعلم أكثر

User transactions

User transactions are a record of interactions and activities carried out by individuals on a platform, typically involving the exchange of goods, services, or information.

يتعلم أكثر

V

Velocity Checks

Velocity checks are used to assess the speed at which something is moving or changing, ensuring it stays within predetermined limits.

يتعلم أكثر

Vishing

Vishing is a form of phishing that uses voice communication, usually over the phone, to deceive individuals into providing sensitive information.

يتعلم أكثر

W

Warranty Fraud

Warranty Fraud: Deceptive act of intentionally misrepresenting or falsifying information to exploit or abuse warranty claims for personal gain.

يتعلم أكثر

Whaling

Whaling is a cyberattack method that focuses on high-profile individuals or executives, aiming to deceive them into revealing sensitive information or access credentials.

يتعلم أكثر

Wire Transfer Regulations

Wire Transfer Regulations: Rules and guidelines governing the electronic transfer of funds between financial institutions.

يتعلم أكثر

World Bank – Financial Market Integrity Unit

The World Bank - Financial Market Integrity Unit combats corruption and promotes transparency in global financial markets.

يتعلم أكثر

Z

Zelle Fraud

Zelle Fraud refers to unauthorized and deceptive activities aimed at exploiting the Zelle digital payment platform for personal gain.

يتعلم أكثر

الهوية الحقيقية

يتعلم أكثر

معدل القبول الحقيقي (TAR)

يشير معدل القبول الحقيقي إلى مقياس عدد المرات التي يحدد فيها نظام الأمان المستخدمين الشرعيين ويسمح لهم بالوصول إليهم.

يتعلم أكثر

Discover Our Solutions

Exploring our solutions is just a click away. Try our products or have a chat with one of our experts to delve deeper into what we offer.

LATEST FROM MICROBLINK

Unlock More Insights

News

2022 Deloitte Technology Fast 500™ Ranks Microbl…

Esteemed group includes global, award-winning, SaaS company with industry-leading number of customers touting triple-digit pe…

اقرأ أكثر
Blog

3 ways automated document verification software sp…

Automated document verification software speeds up onboarding by reducing manual effort, improving accuracy, and enhancing co…

اقرأ أكثر
حالة استخدام الصناعة

A guide to getting remote identity verification ri…

We live in an age where we have dozens, if not hundreds, of online accounts. They form a core link between us and the service…

اقرأ أكثر
Explore resources