Author : | Jae K. Shim, Ph.D., CPA |
Course Length : | Pages: 111 ||| Review Questions: 30 ||| Final Exam Questions: 45 |
CPE Credits : | 9.0 |
IRS Credits : | 0 |
Price : | $80.95 |
Passing Score : | 70% |
Course Type: | NASBA QAS - Text - NASBA Registry |
Primary Subject-Field Of Study: | Computer Software & Applications - Computer Software & Applications for Course Id 1344 |
Description : | The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats. Security concerns have heightened in the recent years. Weak computer security and lack of internal controls increases an organization's vulnerability. The major steps in understanding and managing computer security are discussed in this course, and helps business executives identify resources in their organizations that need to be protected. |
Usage Rank : | 0 |
Release : | 2020 |
Version : | 1.0 |
Prerequisites : | None. |
Experience Level : | Overview |
Additional Contents : | Complete, no additional material needed. |
Additional Links : |
Cybersecurity in CPA and Professional Services Firms
|
Advance Preparation : | None. |
Delivery Method : | QAS Self Study |
Intended Participants : | Anyone needing Continuing Professional Education (CPE). |
Revision Date : | 05-Jan-2021 |
NASBA Course Declaration : | Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam. |
Approved Audience : | NASBA QAS - Text - NASBA Registry - 1344 |
Keywords : | Computer Software & Applications, Computer, Security, cpe, cpa, online course |
Learning Objectives : |
Chapter 1
2. Recognize the three levels of security. 3. Recognize proper security safeguards. Chapter 2
2. Identify environmental considerations as they apply to computer security. 3. Recognize the components of a maintenance log. 4. Identify computer access controls for software and data files. Chapter 3
2. Identify how data integrity may be threatened. 3. Recognize some hardware security devices used to protect the computer system. Chapter 4
2. Recognize different types of viruses and security threats. 3. Recognize the uses of firewall security systems. Chapter 5
2. Recognize the value of an employee performance evaluation system and components of a training system. 3. Identify security issues posed by terminated employees. Chapter 6
2. Identify the tools and techniques used by saboteurs. Chapter 7
2. Recognize activities conducted as part of the risk analysis and management. 3. Recognize human factor threats for security. Chapter 8
2. Recognize components of a contingency plan. 3. Identify fire safety preventive plans. Chapter 9
2. Recognize the audit trail to identify unusual activities. 3. Recognize control techniques. 4. Identify EDI security risks. Chapter 10
2. Identify major issues regarding computer crimes and privacy issues. 3. Identify new certificate programs in computer security. |
Course Contents : | Chapter 1: Organizational Policy Learning Objectives: Introduction Organizational Policy Security Administration Establishing a Security Policy The Security Administrator Final Consideration Chapter 1 Review Questions Chapter 2: Physical Security and Data Preservation Learning Objectives: Computer Facilities Environmental Considerations Protecting Information Controlling Access Hardware Security Software and Devices for Physical Security Chapter 2 Review Questions Chapter 3: Hardware Security Learning Objectives: Physical Security Data Integrity Deploying a Security System VPN Solution Smart Cards eToken Biometrics Intrusion Prevention Systems (IPS) Laptop Security Summary Chapter 3 Review Questions Chapter 4: Software Security Introduction Learning Objectives: Security Breaches What is a Virus? Ransomware What is a Firewall? What is Authentication? What is Encryption? Public/Private Key Technology in Online Trading Digital Signatures Public Key Infrastructure (PKI) Kerberos Pretty Good Privacy The Orange Book Internet Security Market Security Protocols Virtual Private Networks Doing Business over the Internet Email Security Hacked Email Summary Chapter 4 Review Questions Chapter 5: Personnel Security Learning Objectives: Screening Legal Agreements Training New Employees Performance Appraisal Exit Procedures Chapter 5 Review Questions Chapter 6: Network Security Learning Objectives: Passwords Saboteur's Tools Considerations in Designing Networks Secure Sockets Layer Firewalls Pretty Good Privacy (PGP) Vulnerability Testing Using Automated Tools Protecting a Network from Ransomware Conclusion Chapter 6 Review Questions Chapter 7: Security Policy Learning Objectives: Managing Computer Security Creating the Policy and the Plan Risk Analysis and Management The Security Administrator The Human Factor Account Administration Conclusion Chapter 7 Review Questions Chapter 8: Contingency Planning Learning Objectives: The Role of Senior Management Mobile Device Security and Contingency Planning The Contingency Planning Committee Areas to Cover Fire Safety Insurance Cloud Computing Conclusion Chapter 8 Review Questions Chapter 9: Auditing and Legal Issues Learning Objectives: Security Auditing Legal Liability in Security Management Chapter 9 Review Questions Chapter 10: Computer Crime, Cyberfraud, and Recent Trends Learning Objectives: Computer Crime Privacy Issues Tools of Security Management Other Security Measures Cloud Computing Chapter 10 Review Questions Glossary |