Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
Overview
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.
Highlights
- Forensic Accounting
- Accounting
- Finance
- Auditing
Prerequisites
None
Designed For
Forensic Accountants, Accountants, Finance, Auditors
Objectives
- Explore the concepts of modern and classic cryptography
- Identify and examine types of cyphers used in cryptography
- Discover and discuss concepts of public key transcription, hashtags, block and stream ciphers used in cryptography
- Discover the concepts of cryptoanalysis
Preparation
None
Notice
This course is offered by a 3rd party vendor and will not be accessible in the My CPE Tracker section of the ISCPA website. Course access information will be emailed directly to you by Accounting Continuing Professional Education Network (ACPEN).
Leader(s):
Leader Bios
Lynn Fountain, Lynn A Fountain
Lynn Fountain has over 40 years of experience spanning public accounting, corporate accounting and consulting. 20 years of her experience has been working in the areas of internal and external auditing. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial management and compliance. Lynn has held two Chief Audit Executive (CAE) positions for international companies. In one of her roles as CAE, she assisted in the investigation of a multi-million-dollar fraud scheme perpetrated by a vendor that spanned 7 years and implicated 20 employees. The fraud was formally investigated by the FBI and resulted in five indictments amounting to close to a $13 million fraud loss. Lynn is currently engaged in her own consulting and training practice. She has assisted numerous companies with enterprise risk management frameworks, internal audit processes and financial accounting. She is a highly sought after speaker and has trained internationally. In addition to her personal training, she also serves as a discussion leader for the AICPA for numerous classes. Lynn is the author of three separate technical books released in 2015, The first entitled “Raise the Red Flag – The Internal Auditors Guide to Fraud Evaluations”, published by the Institute of Internal Auditors Research Foundation and released in April 2015. Her second book “Leading The Internal Audit Function” was released in October 2015 by Taylor & Francis Publications. This book serves as the initial launch for a series of leading practice internal audit and information technology publications. In addition, her third book “Ethics and the Internal Auditor’s Dilemma” was released in December 2016. Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has her CGMA, CRMA credentials and CPA certificate.
Non-Member Price $59.00
Member Price $39.00