Skip to main content

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

Saturday, May 10
 11:00am - 12:27pm

(Check-In )

Add to Calendar

Online

1.60 Credits

Member Price $59.00

Non-Member Price $79.00

Overview

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved.

There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
 

Objectives

  • Explore and examine the concepts of steganography
  • Discover and evaluate text steganography
  • Identify and evaluate image steganography
  • Explore and evaluate audio steganography
  • Discover and evaluate video steganography

Highlights

  • Forensic Accounting
  • Accounting
  • Auditing
  • Finance

Designed For

Accountants, Finance Professionals, Auditors

Prerequisites

None

Preparation

None

Notice

Your webinar can be accessed via https://ctcpas.acpen.com/Account/loginhttps://ctcpas.acpen.com/. If you do not have an ACPEN account, please sign up for an account using the email address you have on file with CTCPA.

Leader(s):

Leader Bios

Lynn Fountain, AICPA

Lynn Fountain, CGMA, CRMA, MBA 1/1/2017 Lynn Fountain has over 35 years of experience spanning public accounting, corporate accounting and consulting. 20 years of her experience has been working in the areas of internal and external auditing. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial management and compliance. She has held two Chief Audit Executive (CAE) positions for international companies. In one of her roles as CAE, she assisted in the investigation of a multi-million-dollar fraud scheme perpetrated by a vendor that spanned 7 years and implicated 20 employees. The fraud was formally investigation by the FBI and resulted in 5 indictments estimating a $13M fraud loss. Ms. Fountain is currently engaged in her own consulting and training practice. She has assisted numerous companies with enterprise risk management frameworks, internal audit processes and financial accounting. She is a highly sought after speaker and has trained internationally. In addition to her personal training, she also serves as a discussion leader for the AICPA for numerous classes. Topics include fraud and forensic courses for both profit and not-for profit, internal controls for large and small entities, COSO 2013, ethics, and risk management and various leadership courses. Ms. Fountain is the author of three separate technical books released in 2015, The first entitled “Raise the Red Flag – The Internal Auditors Guide to Fraud Evaluations” was published by the Institute of Internal Auditors Research Foundation and released in April 2015. Her second book “Leading The Internal Audit Function” was released in October 2015 by Taylor & Francis Publications. This book serves as the initial launch for a series of leading practice internal audit and information technology publications. In addition, her third book “Ethics and the Internal Auditor’s Dilemma” was released in December 2016. Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has her CGMA, CRMA credentials and CPA certificate. www.lynnfountain.net fountainlynn1@gmail.com

Return to Top

Non-Member Price $79.00

Member Price $59.00