K2's Case Studies In Fraud And Technology Controls

K2's Case Studies In Fraud And Technology Controls

K2’s Case Studies In Fraud And Technology Controls

Course - K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

Major Topics

  • Key fraud risks impacting businesses today
  • Examples of fraud and the monetary impact on victims
  • How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim

Learning Objectives

  1. Define information technology general controls and information technology application controls and distinguish between the two
  2. List examples of critical information technology controls
  3. Recognize control failures and weaknesses that can lead to fraud
  4. •List recommendations for improving internal controls in an organization

Description

Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures contributing to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is applying information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be positioned better to reduce fraud risk.

Compliance Information

CPAs and other accounting, auditing, and business professionals who are seeking to reduce fraud risk None Auditing 8 Credits November 2, 2022

Overview

Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures contributing to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is applying information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be positioned better to reduce fraud risk.

Course Details

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

  1. List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
  2. Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  3. List at least three best practices learned by reviewing the control failures cited in the case studies

Intended Audience — Business professionals seeking to optimize their home network solution

Advanced Preparation — None

Field of Study — Information Technology

Credits — 2 Credits

IRS Program Number

Published Date – January 1, 2025

Revision Date

Course Authors

No items found