Phishing
Fraudulent attempt to obtain sensitive information.
Why it matters
Phishing matters because it connects system design, data infrastructure, security, and operational reliability with the practical decisions teams make inside fraud, identity, and security. A weak understanding can lead to poor product framing, misleading market interpretation, incomplete compliance checks, or incorrect assumptions about how a financial workflow behaves.
How it works
In practice, Phishing is read through its definition, the systems or market actors it touches, and the way it changes decisions around authentication, credential safety, transaction approval, and fraud-loss prevention. A useful review asks who uses the term, what data or obligation it changes, which control owns the outcome, and whether the meaning differs across product, market, and regulatory contexts.
Risks and pitfalls
Teams can overtrust a control if they do not separate identity proof, possession, authorization, and transaction intent. The risk increases when the same label is reused across banking, crypto, capital markets, software, and analytics without checking whether the operational meaning is still the same.
Regional notes
This concept appears across BIST, MOEX, GLOBAL contexts, but implementation can change with local regulation, payment rails, trading venues, data availability, and institutional practice. For BIST, MOEX, and global comparisons, the safest approach is to keep the definition stable while checking market-specific rules and infrastructure before drawing conclusions.
Related terms
Data Breach
Security incident exposing confidential information.
Deepfake
AI-generated synthetic media that imitates a real person's face or voice and is increasingly relevant to identity fraud, impersonation, and KYC controls.
PCI DSS
Payment Card Industry Data Security Standard.
Air Gap
Offline security measure.
Firewall
Network security system monitoring incoming/outgoing traffic.
Cybersecurity
Practice of protecting systems from digital attacks.
Primary sources
EMVCo
2026-03-15EMVCo: EMV 3-D Secure
Primary source for 3DS protocol terminology.
Financial Action Task Force
2026-05-04FATF: The FATF Recommendations
Primary international AML/CFT framework for customer due diligence, sanctions screening, and financial crime controls.
Coinbase
2026-03-15Coinbase Learn: Crypto glossary
Reference source for crypto infrastructure terminology.
Reviewed
3/15/2026