click below
click below
Normal Size Small Size show me how
Identity theft terms
Question | Answer |
---|---|
Anti-Virus Software | designed to detect and destroy computer viruses. |
Better Business Bureau | (BBB), founded in 1912, is a nonprofit organization focused on advancing marketplace trust |
Dumpster Diving | dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. |
Equifax | Equifax Inc. is a consumer credit reporting agency in the United States, considered one of the three largest American credit agencies along with Experian and TransUnion. |
Experian | Experian plc is a global information services group with operations in 40 countries |
Federal Trade Commission | a federal agency, established in 1914, that administers antitrust and consumer protection legislation in pursuit of free and fair competition in the marketplace. |
Firewall | a part of a computer system or network that is designed to block unauthorized access while permitting outward communication |
Forgery | the action of forging or producing a copy of a document, signature, banknote, or work of art. |
Fraud | wrongful or criminal deception intended to result in financial or personal gain. |
Identity Theft | the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. |
Internal Revenue Service | The Internal Revenue Service (IRS) is a bureau of the Department of Treasury that is tasked with the enforcement of income tax laws and oversees the collection of federal income taxes. |
Peer-To-Peer | denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server |
Phishing | the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers |
Scams | dishonest scheme; a fraud. |
Shoulder Surfing | the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information. |
Snail Mail | the ordinary postal system as opposed to email. |
Solicitations | the act of asking for or trying to obtain something from someone |
Spam | irrelevant or inappropriate messages sent on the Internet to a large number of recipients |
Spyware | software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. |
TransUnion | is an American company that provides credit information and information management services to approximately 45,000 businesses and approximately 500 million consumers worldwide in 33 countries |