Payments and Fraud Glossary


E-ID services

Services for entity authentication and signing data.

Electronic Data Interchange (EDI)

It is an electronic communication method that provides standards for exchanging data. By adhering to the same standard, companies that use EDI can transfer data from one branch to another and even across the world.

Employment Scam

Fraudsters advertise fake jobs using real or fake company names to collect consumer information and/or request payment credentials for training or fake credit checks .


A method of coding data, using an algorithm, to protect it from unauthorized access. There are many types of data encryption, and they are the basis of network security.

End-to-end encryption

Uninterrupted protection of the integrity and confidentiality of transmitted data by encoding it at the start and decoding it at the end of the transaction.

Endpoint authentication

A security system that verifies the identity of a remotely connected device (and its user), such as a personal digital assistant (PDA) or laptop, before allowing access to enterprise network resources or data.

Endpoint protection

Endpoint protection refers to a wide range of solutions for protecting and/or detecting compromise of the end-user’s computing device (desktop, laptop, mobile device, etc.). Endpoint protection solutions, in general, use one or more of the following techniques:

  • Hardening: the solution blocks or otherwise eliminates commonly exploited vulnerabilities.Monitoring/Detection: the solution monitors the system and/or user behavior and detects anomalies.
  • Sandbox: the solution redirects any untrusted content to a sandbox environment that enables safe identification of malicious content.
  • Anti­Virus solutions are an example of endpoint solutions that generally use a signature/rule based approach.
  • Sensitive Information Protection solutions rely more on information classification and heuristics or machine learning­ based algorithms for detection of abnormal information.
  • Malware Protection solutions rely on a combination of one or more of the three techniques.

EMV (Europay-Mastercard-Visa) is a global standard for credit and debit cards based on chip card technology. The EMV cards make in-person transactions more secure, but increase the threat of fraud in card-not-present transactions because the chip is not involved in the transaction and provides no benefit when the card is not present.

Email tumbling

It is sequential email addresses. For example, organized fraud transactions assigned to johndoe01@, johndoe02@, johndoe03@, etc. is indicative of a fraudster automatically generating email addresses.