Introduction to Cyber Fraud (Completed)

Date: Monday, April 23, 2018
Instructor: Robert K Minniti
Begin Time:  9:00am Pacific Time
10:00am Mountain Time
11:00am Central Time
12:00pm Eastern Time
CPE Credit:  2 hours for CPAs

This course is designed for individuals who would like to obtain a basic understanding of cyber fraud. We will discuss various types of cyber frauds and how the criminals commit the frauds. We will review some of the legal and ethical implications involved. Examples of real world cases will be provided to help develop and understanding of the risks involved. We will review policies, procedures, hardware, software, and internal controls that can be used to help prevent an organizations from being victimized.

Who Should Attend
CFOs, CEOs, business owners, business managers, internal auditors, external auditors, corporate accountants, government accountants and risk management personnel.

Topics Covered

  • Definition of cyber fraud
  • The New Generation of Cyber Fraud
  • Examples of Exploits
  • Phishing Examples
  • Denial of Service Attacks
  • Brand Hacking
  • Pharming
  • Spoofing
  • Malware
  • Ransomware
  • CryptoLocker
  • Virtual Currencies
  • Bitcoin ATMs
  • Cell Phone Malware & Spyware
  • Other Spyware
  • Trojan Horse
  • Computer Worms
  • Rootkits
  • Backdoors
  • Data Breaches
  • Examples of Data Breaches
  • Stolen Data
  • Purchasing Credit Card Numbers
  • Purchasing IDs & Passwords
  • Obtaining Fake IDs
  • Internet Structure
  • Surface Net
  • The Deep Net
  • The Hidden Wiki
  • Darknet Sites
  • How TOR works
  • Internal Controls
  • COSO Requirements for IT

Learning Objectives

  • Describe cyber fraud
  • Recognize various types of cyber fraud
  • Differentiate examples of cyber fraud and how they are used
  • Identify types of spyware
  • Identify a route into a computer that circumvents the user authentication process and allows hackers open access to the system once it is installed
  • Recognize who commits the majority of data breaches
  • Describe internet structure and how it applies
  • Differentiate types of cybercrimes that occur
  • Recognize statistics of data breaches
  • Describe examples of different types of websites
  • Identify an anonymous network for sending email and surfing the web
  • Describe and implement internal controls to help prevent cyber fraud
  • Identify best practices with respect to internal controls

Level
Basic

Instructional Method
Group: Internet-based

NASBA Field of Study
Accounting (1 hour), Auditing (1 hour)

Program Prerequisites
None

Advance Preparation
None

 Chat — Books Support