Procurement Fraud Schemes Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

flashcard set

Earn XP

Description and Tags

Flashcards on Procurement Fraud Schemes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

Bid Rotation

Occurs when two or more contractors conspire to alternate the business among themselves on a rotating basis.

2
New cards

Bid Suppression

Occurs when two or more contractors enter into an illegal agreement whereby at least one of the conspirators refrains from bidding or withdraws a previously submitted bid.

3
New cards

Market Division

Schemes involve agreements among competitors to divide and allocate markets and to refrain from competing in each other’s designated portion of the market.

4
New cards

Shell companies

Companies that have no physical presence and generate little independent economic value

5
New cards

Need Recognition Schemes

Occurs when procurement employees convince their employer that it needs excessive or unnecessary products or services.

6
New cards

Bid Specifications

A list of elements, measurements, materials, characteristics, required functions, and other speci c information detailing the goods and services that a procuring entity needs from a contractor.

7
New cards

Bid Tailoring Schemes

Schemes occur during the presolicitation phase where an employee with procurement responsibilities drafts bid speci cations in a way that gives an unfair advantage to a certain contractor.

8
New cards

Bid Manipulation Schemes

Schemes occur during the solicitation and evaluation phases where a procuring employee manipulates the bidding process to bene t a favored contractor or supplier.

9
New cards

Leaking Bid Data

Occurs when employees of a procuring entity leak pre-bid information or con dential information from competing bidders to a favored bidder, giving that bidder an unfair advantage in the bidding process.

10
New cards

Bid Splitting

Dividing a large project into several small projects that fall below the mandatory bidding level

11
New cards

Sole-Source Contracting

A noncompetitive procurement process accomplished through the solicitation of only one source, thereby limiting full and open competition.

12
New cards

Defective pricing

Arises when contractors intentionally use inaccurate cost or pricing data to in ate costs in negotiated contracts.

13
New cards

Nonconforming goods or services fraud

Refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract speci cations.

14
New cards

Change order

A written agreement between the procuring entity and the contractor to make changes in a signed contract.

15
New cards

Cost Mischarging Schemes

Occur when a contractor charges the procuring entity for costs that are not permissible, are not reasonable, or cannot be allocated to the contract directly or indirectly.

16
New cards

Accounting Mischarges

Occur when a contractor knowingly charges unallowable costs to the buyer by concealing or misrepresenting them as allowable costs, or by hiding them in accounts, such as o ce supplies, that are not usually closely audited.

17
New cards

Material Mischarges

Occurs when a contractor charges costs from materials incurred on a xed-price contract to a cost-type contract.

18
New cards

Labor Mischarges

Occurs when the contractor charges the procuring entity for work that was not actually performed.

19
New cards

Hacking

Using technology to gain unauthorized access to sensitive information on a computer system.

20
New cards

Black-hat hackers

Malicious hackers who in ltrate computer systems for criminal purposes

21
New cards

White-hat hackers

Well-intentioned hackers who are hired to identify weaknesses in an organization’s network before they are exploited by malicious hackers.

22
New cards

Hacktivists

Politically motivated hackers; they commit cybercrimes, including data breaches, to access classi ed or con dential information

23
New cards

Social engineering

A method for gaining unauthorized access to a computer system in which the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme.

24
New cards

Phishing

A type of social engineering scheme that involves impersonating a trusted individual or entity.

25
New cards

Spear Phishing

A targeted phishing attack generally focused on a corporate entity or a speci c employee within the entity.

26
New cards

Business email compromise (BEC)

A form of spear phishing attack that directly targets employees who can make large payments or who have access to sensitive proprietary information.

27
New cards

Vishing

Leveraging Voice over Internet Protocol (VoIP) in using the telephone system to falsely claim to be a legitimate enterprise to scam users into disclosing personal information or executing an act that furthers a scheme.

28
New cards

Smishing

A hybrid of phishing and short message service (SMS), also known as text messaging, used to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or other entity with which the target does business.

29
New cards

Pharming

A type of attack in which users are fooled into entering sensitive data into a malicious website that imitates a legitimate website.

30
New cards

Catfishing

Involves the creation of a ctitious online persona to lure victims into emotional relationships under false pretenses.

31
New cards

Reverse Social Engineering

Attackers get the users to make the contact where attackers disguise themselves as technical assistants or someone from whom the user needs help (a need often created beforehand by the attacker through sabotage).

32
New cards

Password Cracking

An automated process by which an attacker attempts to guess a system user’s most likely passwords

33
New cards

Browsing

Involves searching through large quantities of available data to nd sensitive information.

34
New cards

Keystroke Logging

The process of monitoring and tracking the keys pressed on a keyboard.

35
New cards

Backdoors

Lets attackers bypass a system’s security using undocumented operating system and network functions.

36
New cards

Remote Access Trojans

A type of malicious software that provides the attacker with complete control of the target’s system.

37
New cards

Packet Sni ng

Computer programs that monitor tra c on areas of a network and search for packets of data as they pass through the network.

38
New cards

Trapdoors

A secret entry point into a program that allows someone who is aware of the trapdoor to gain access without going through the usual security access procedures.

39
New cards

HTTP Exploits

Involves using internet server applications to perform malicious activities by using a hypertext transfer protocol (HTTP) to transfer hypertext documents across an array of computer systems.

40
New cards

Spoofing

The process whereby a person or program masquerades as another to obtain unauthorized access to a targeted system.

41
New cards

Shoulder Sur ng

Obtains sensitive information by observing a targeted person from a nearby location

42
New cards

Piggybacking

Exploits another person’s access capability to gain access to restricted areas, including computer systems.

43
New cards

Scavenging and Dumpster Diving

Obtaining information left around a computer system, such as on desks or workstations or looking through someone else’s trash.

44
New cards

Data Manipulation and Destruction

Refers to the use or manipulation of a computer to perpetrate a crime and involves either direct or covert unauthorized access to a computer system by the introduction of malicious software such as viruses, worms, or logic bombs.

45
New cards

Malware

Any kind of malicious software, including viruses, worms, Trojan horses, spyware, and ransomware.

46
New cards

Salami Technique

A type of fraud where the perpetrator steals a substantial amount of money by “slicing” o “thin” amounts of cash repeatedly over time.

47
New cards

Fraud by Input Manipulation

Occurs when false or misleading information is entered into a system to achieve a speci c fraudulent purpose.

48
New cards

Data Leakage

Refers to the unauthorized transmission of data from within an organization to an outside destination.

49
New cards

Buffer Overflow Exploits

Sending inordinate amounts of data to a running program that is waiting to receive input.

50
New cards

Privilege Escalation Exploits

Refers to the act of exploiting a bug, design aw, con guration oversight, or other vulnerability in an operating system or software application to gain access that is beyond the user’s authorized access level.

51
New cards

Internet of Things (IoT)

The environment of everyday objects that use embedded sensors to collect and transmit data through the internet.

52
New cards

Con ict of Interest

Occurs when an employee or agent—someone who is authorized to act on behalf of a principal—has an undisclosed personal or economic interest in a matter that could in uence their professional role.

53
New cards

Fiduciary Duty

The duties imposed by law to their principals or employers, and any action that does not comply with those duciary duties constitutes a breach

54
New cards

Conflict of Interest

The agent should not have a in completing the act on the principal’s behalf.

55
New cards

Turnaround Sale

A purchasing scheme often used by fraudsters is called the , or the ip, where the fraudster takes advantage of the situation by purchasing the asset themselves, then turning around and reselling the item to their employer at an in ated price

56
New cards

Underselling or writing off sales

The or of goods and services are two principal types of con ict schemes associated with sales of goods or services by the victim company.

57
New cards

Resource Diversions

Divert the funds and other resources of their employers to the development of their own businesses.

58
New cards

Most serious

The inadequate disclosure of con icts of interest is among the _ of frauds

59
New cards

Appearance

The of a con ict is nearly as problematic as the existence of a true con ict.

60
New cards

Consumer Fraud

Embodies a wide variety of misleading practices related to advertising, marketing, or the selling or buying of goods and services.

61
New cards

Advance-Fee schemes

Schemes are structured to obtain an illegal gain by falsely promising the delivery of a product or service.

62
New cards

Debt consolidation

This scheme, agencies do not advance loans but act as an intermediary between debtor and creditor.

63
New cards

Diploma mills

For what is often a hefty fee, a diploma can be purchased by those who apply. The fraudster usually claims that the fee is for processing the application or for verifying the experience necessary for the degree to be awarded

64
New cards

Dietary and Health Cure schemes

schemes are consumer fraud schemes in which fraudsters attempt to deceive consumers by claiming certain products or foods are organic and pure and will cure or eliminate certain illnesses or diseases.

65
New cards

Modeling and Acting schemes

These fraudulent agencies are not set up to promote talent, but rather to get consumers to purchase a program that provides no bene ts

66
New cards

Automatic debit program

These programs are a convenient way to pay bills, such as recurring charges for mortgages and car loans that can be easily exploited

67
New cards

Equity-skimming schemes

A perpetrator draining the equity from a home though various means such as a home equity line of credit or re nancing the home multiple times and thus skimming the equity.

68
New cards

Sweepstakes, giveaways, and prizes

Some schemes lure in victims by stating that they have won a sweepstakes or large prize where The scammer then notes that the winner must pay certain fees before claiming a prize.

69
New cards

College Scholarship services.

These fake services usually charges an up-front fee or advance payment fee for nding a scholarship suitable for the applicant where Valid negative credit information cannot be removed or erased from a credit report.

70
New cards

Credit Repair

These fraudulent companies use solicitations that o er to repair a consumer’s credit. These statements are not only false but might be illegal

71
New cards

Credit Card Debt Elimination Scheme

These schemes have Consumers are lured by scammers who promise to eliminate their debt after they have paid a hefty fee.

72
New cards

Credit Analysis O ers Scheme

This Scheme is Normally, sold as advertisements on television, through the mail, or on the radio, o ering people the ability to obtain information about credit repair programs and to receive a “con dential analysis” of a consumer’s credit history.

73
New cards

Missing-Heir Scheme

The fraudster poses as a probate investigator or other genealogist, charging fees to distribute an inheritance.

74
New cards

Airline Ticket Scheme

To attract customers, some sites signi cantly undercut competitor prices by o ering deals that are so good they seem unbelievable where Fraudsters create ctitious websites to capture a consumer’s personal information (e.g., credit card information) to commit other frauds

75
New cards

Scamming Families of Migrant Children

Scammers that use knowledge of children who have crossed international borders to extort money from their family members. They claim to work for a government agency or to be child welfare workers.

76
New cards

Government Imposter Scheme

Some fraudsters impersonate government o cials that claims to work for a government agency, and say they won the lottery but need funds paid prior

77
New cards

Romance, Sweetheart, and Friendship Scheme

Fraudsters o er love or friendship to a lonely person, especially a nancially well-o widow or widower that charm themselves into the victim’s heart and then attempt to steal their money, often by asking for a loan.

78
New cards

Travel or Vacation Scheme

A is a variation of an advance-fee scheme that occurs when a fraudster creates a fake vacation rental listing or website whereThe fraudster takes photos of properties directly from the internet and uses random interior photos from other rental sites to make the properties appear inhabited.

79
New cards

Bait and Swaitch

The fraudster advertises unavailable properties and reserves a less desirable rental for the victim. and this is often called _.

80
New cards

Price Jacking

Travelers get the rental they reserved and pay more for it than they agreed.

81
New cards

Deceptive Email Scheme

A fraudster hacks into the email account of a legitimate rental owner or manager and forwards the rental inquiries to the fraudster’s own email account.

82
New cards

Hotel Scheme

Consumers typically have con dence that hotel management has fraud prevention measures established, but, unfortunately, hotels are susceptible to consumer fraud schemes

83
New cards

Insurance Fraud Schemes

Schemes come in many forms and are damaging to society.

84
New cards

Child Adoption Schemes

includes any illegal act or intentional misrepresentation by any party involved in the adoption process.

85
New cards

Electronic payment fraud

Occurs when an individual with authorized or unauthorized access intentionally uses or manipulates a consumer’s bank account for personal gain

86
New cards

Fraud Classified Model

Occurs when organizations are pressured for payments to accounts that are not truly managed for their stated purpose.