Skip to main content
Live Webcast Replay

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)


Total Credits: 1.6 including 1 Accounting - Technical, .6 Auditing- Technical

Average Rating:
   2
Categories:
ACPEN Industry Institute |  Accounting and Auditing |  Personal Development
Faculty:
Lynn Fountain
Course Levels:
Basic
Duration:
1.6 Hours
License:
Product Setting: Expires 30 day(s) after program date.

Dates
Please Note: Programs with a ☾ insignia begin after 5pm or air on the weekend.


Description

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved.

There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
 

Basic Course Information

Learning Objectives
  • Explore and examine the concepts of steganography
  • Discover and evaluate text steganography
  • Identify and evaluate image steganography
  • Explore and evaluate audio steganography
  • Discover and evaluate video steganography

Major Subjects
  • Forensic Accounting
  • Accounting
  • Auditing
  • Finance

Course Materials

Faculty

Lynn Fountain's Profile

Lynn Fountain Related Seminars and Products


Lynn Fountain has over 45 years of experience spanning public accounting, corporate accounting and consulting. 20 years of her experience has been working in the areas of internal and external auditing and risk management. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial management and compliance. Lynn has held two Chief Audit Executive (CAE) positions for international companies. In one of her roles as CAE, she assisted in the investigation of a multi-million-dollar fraud scheme perpetrated by a vendor that spanned 7 years and implicated 20 employees. The fraud was formally investigation by the FBI and resulted in 5 indictments estimating a $13M fraud loss.Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has her CPA, CGMA, CRMA credentials.


Dates

Thu, Jan 02, 2025 - 03:00pm to 04:27pm CST
Sat, Jan 11, 2025 - 10:00am to 11:27am CST
Fri, Jan 17, 2025 - 09:00am to 10:27am CST
Thu, Feb 13, 2025 - 11:00am to 12:27pm CST
Thu, Feb 27, 2025 - 01:00pm to 02:27pm CST
Tue, Mar 04, 2025 - 03:00pm to 04:27pm CST
Mon, Mar 17, 2025 - 09:00am to 10:27am CDT
Fri, Apr 11, 2025 - 11:00am to 12:27pm CDT
Thu, Apr 24, 2025 - 01:00pm to 02:27pm CDT
Fri, May 02, 2025 - 03:00pm to 04:27pm CDT
Sat, May 10, 2025 - 10:00am to 11:27am CDT
Mon, May 12, 2025 - 09:00am to 10:27am CDT
Tue, Jun 10, 2025 - 06:00pm to 07:27pm CDT
Fri, Jun 27, 2025 - 01:00pm to 02:27pm CDT

Additional Info

Basic Course Information

Prerequisites None
Advanced Preparation None
Designed For Accountants, Finance Professionals, Auditors
Original Recording Date 01/01/2024
Course Developer Lynn Fountain
Date Added to Catalog 02/14/2024
Yellow Book No

Additional Information

Complaint Resolution Policy

Please contact Anne Taylor for any complaints. anne.taylor@acpen.com, (972-377-8199). 


Official Registry Statement

Business Professionals' Network, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org


Instructional Delivery Method

Group Internet Based


Course Registration Requirements

Online Registration


Refund/Cancellation Policy

Please contact the ACPEN help desk 1-877-602-9877 or help@acpen.com if you wish to cancel your attendance for a previously purchased webcast and are requesting a refund or transfer. 


Reviews

5
4
3
2
1

Overall:      5

Total Reviews: 2