|Author :||Jae K. Shim, Ph.D., CPA|
|CPE Credits :||9.0|
|IRS Credits :||0|
|Passing Score :||70%|
|Course Type:||NASBA QAS - Text - NASBA Registry|
|Primary Subject-Field Of Study:||
Computer Software & Applications - Computer Software & Applications for Course Id 1344
The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats. Security concerns have heightened in the recent years. Weak computer security and lack of internal controls increases an organization's vulnerability. The major steps in understanding and managing computer security are discussed in this course. The course helps business executives identify resources in their organizations that need to be protected.
|Usage Rank :||0|
|Experience Level :||Overview|
|Additional Contents :||Complete, no additional material needed.|
|Additional Links :|
|Advance Preparation :||None.|
|Delivery Method :||Self-Study|
|Intended Participants :||Anyone needing Continuing Professional Education (CPE).|
|Revision Date :||13-Sep-2019|
|NASBA Course Declaration :||Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.|
|Approved Audience :||
NASBA QAS - Text - NASBA Registry - 1344
|Keywords :||Computer Software & Applications, Computer, Security, cpe, cpa, online course|
|Learning Objectives :||
2. Recognize the three levels of security.
3. Recognize proper security safeguards.
2. Identify environmental considerations as they apply to computer security.
3. Recognize the components of a maintenance log.
4. Identify computer access controls for software and data files.
2. Identify how data integrity may be threatened.
3. Recognize some hardware security devices used to protect the computer system.
2. Recognize different types of viruses and security threats.
3. Recognize the uses of firewall security systems.
2. Recognize the value of an employee performance evaluation system and components of a training system.
3. Identify security issues posed by terminated employees.
2. Identify the tools and techniques used by saboteurs.
2. Recognize activities conducted as part of the risk analysis and management.
3. Recognize human factor threats for security.
2. Recognize components of a contingency plan.
3. Identify fire safety preventive plans.
2. Recognize the audit trail to identify unusual activities.
3. Recognize control techniques.
4. Identify EDI security risks.
2. Identify major issues regarding computer crimes and privacy issues.
3. Identify new certificate programs in computer security.
|Course Contents :||
Chapter 1: Organizational Policy
Establishing a Security Policy
The Security Administrator
Chapter 1 Review Questions
Chapter 2: Physical Security and Data Preservation
Software and Devices for Physical Security
Chapter 2 Review Questions
Chapter 3: Hardware Security
Deploying a Security System
Intrusion Prevention Systems (IPS)
Chapter 3 Review Questions
Chapter 4: Software Security
What is a Virus?
Illegal Access and Use - Hacking
What is a Firewall?
What is Authentication?
What is Encryption?
Public/Private Key Technology in Online Trading
What is Digital Signature?
What is a Public Key Infrastructure (PKI)?
What is Kerberos?
What is Pretty Good Privacy?
What was the Orange Book?
Internet Security Market
What is VPN?
Doing Business over the Internet
Chapter 4 Review Questions
Chapter 5: Personnel Security
Training New Employees
Chapter 5 Review Questions
Chapter 6: Network Security
Considerations in Designing Networks
Secure Sockets Layer
Pretty Good Privacy (PGP)
Vulnerability Testing Using Automated Tools
Protecting Your Networks from Ransomware
Chapter 6 Review Questions
Chapter 7: Security Policy
Managing Computer Security
Creating the Policy and the Plan
Risk Analysis and Management
The Security Administrator
The Human Factor
Chapter 7 Review Questions
Chapter 8: Contingency Planning
The Role of Senior Management
Mobile Device Security and Contingency Planning
The Contingency Planning Committee
Areas to Cover
Chapter 8 Review Questions
Chapter 9: Auditing and Legal Issues
EDI and Electronic Contracting
Auditing Contingency Plans
Legal Liability in Security Management
Chapter 9 Review Questions
Chapter 10: Computer Crime, Cyberfraud, and Recent Trends
Tools of Security Management
Other Security Measures
FTC - Computer Security
Chapter 10 Review Questions