Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
1.50 Credits
Member Price $59
Non-Member Price $79
Overview
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved.
There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Highlights
- Forensic Accounting
- Accounting
- Auditing
- Finance
Prerequisites
None
Designed For
Accountants, Finance Professionals, Auditors
Objectives
- Explore and examine the concepts of steganography
- Discover and evaluate text steganography
- Identify and evaluate image steganography
- Explore and evaluate audio steganography
- Discover and evaluate video steganography
Preparation
None
Leader(s):
Leader Bios
Lynn Fountain, Sole Proprietor
Lynn Fountain, CGMA, CRMA, MBA, has over 30 years of experience in the business profession, which includes public and industry accounting and over 20 years within internal and external auditing combined. She is a nationally recognized trainer and speaker and also a published author. She is a subject matter expert and specializes in Internal Audit, Sarbanes-Oxley, Enterprise Risk Management, Fraud, Governance and Compliance. Ms. Fountain has held two Chief Audit Executive positions for international companies. She has also been instrumental in the establishment of ERM, Sarbanes-Oxley and Governance frameworks.
Ms. Fountain has developed and delivered leading edge training sessions on the new COSO framework and has assisted companies in identifying risk gap analysis in their individual processes. She currently executes two highly recognized e-workshops for the Institute of Internal Auditors, one on Fraud and the second on Ethics. Both workshops have incorporate aspects of COSO 2013.
Ms. Fountain is in the process of authoring a publication for the IIA Research Foundation on aspects of fraud auditing. The publication is due out in 2015. In addition, she has performed as an adjunct instructor for the School of Business for Grantham University and the School of Business at the University of Kansas. Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas.
Non-Member Price $79
Member Price $59