Technological advancements facilitate new forms of cybercrime and fraud. In this session, you will learn how the crooks used technology to reap their ill-gotten rewards.
Product Code
1000004795-138449
Credit Type
CPE: 2
CPE-Technical: 2
NASBA Field of Study
Information Technology
Level of Difficulty
Intermediate
Prerequisites
Basic understanding of common business technologies and related risks
Advance Preparation
None
Learning Objectives
Identify at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
Identify at least three best practices learned by reviewing the control failures cited in the case studies
Major Subjects
Common security weaknesses that occur with hardware and software at home and in the office
Malware, ransomware, data breach, and incident response tips
Internal control failures that result in the theft of assets or unauthorized manipulation of data
Tommy Stephens received a Bachelor of Science in Business Administration degree (Major in Accounting) from Auburn University in 1985. In 1992, he earned a Master of Science degree (Major in Finance) from Georgia State University in Atlanta. Presently, Tommy is a Certified Public Accountant, a Certified Information Technology Professional, and a Chartered Global Management Accountant. During his professional career, Tommy has gained valuable ex...