Technological advancements facilitate new forms of cybercrime and fraud. In this session, you will learn how the crooks used technology to reap their ill-gotten rewards.
Learning Objectives
• Identify at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
• Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
• Identify at least three best practices learned by reviewing the control failures cited in the case studies
Major Topics
• Common security weaknesses that occur with hardware and software at home and in the office
• Malware, ransomware, data breach, and incident response tips
• Internal control failures that result in the theft of assets or unauthorized manipulation of data