Credential

Credential is the way in which a user proves his/her identity; usually with an ID and a password. Each of these is a credential. Ref.: https://www.perfectcloud.io/resources/glossary/

Continue Reading Credential

Criminal Identity Theft

Criminal Identity Theft occurs when an imposter gives another person's name and personal information such as a drivers' license, date of birth, or Social Security number to commit a crime…

Continue Reading Criminal Identity Theft

Cryptoglyph

Cryptoglyph ® is a trademarked security system from Alpvision SA using encrypted invisible marks. Often used for product packaging authentication. Cryptoglyph feature is effective primarily in document-present situations where the…

Continue Reading Cryptoglyph

Cryptography

Cryptography is the process of translating data into an unintelligible form Ref.: https://www.gpo.gov/pdfs/customers/security_glossary.pdf

Continue Reading Cryptography

Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is Primarily procedural assessment that is required when a firm covered by money laundering regulations, 'enters into a business relationship' with a customer or a potential…

Continue Reading Customer Due Diligence (CDD)

Cyber Fraud

Cyber Fraud committed using a computer, such as hacking, denial of service attacks, phishing, etc. Ref.: http://www.cpp.co.uk/helpful-info/fraud-glossary-of-terms#m‍

Continue Reading Cyber Fraud

DNA Ink

DNA Ink is ink with a unique biological marker. This DNA Ink feature is effective primarily in document-present situations where the original document can be examined by a trained professional…

Continue Reading DNA Ink

Darknet

Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports. Two typical darknet types are friend-to-friend networks…

Continue Reading Darknet

Data Breach

Data Breach is the intentional or unintentional release of secure information to an untrusted environment. Source: https://en.wikipedia.org/wiki/Data_breach

Continue Reading Data Breach

Data Comparison

Data Comparison is a Forgery or counterfeit detection methodology that compares 2 or more datasets found on a certain document. Such datasets can include printed data, MRZ lines, Barcodes, chip…

Continue Reading Data Comparison