Internal Controls for Data Security
Overview
Online
Description
In the modern business environment, the security of an organization’s data is as important as that of its tangible assets, if not more. While revolutionary breakthroughs in technology and information have greatly increased productivity, these developments have also yielded a host of new security concerns. Awareness of these threats to data security, as well as how to address them, is critical to maintaining competitiveness, preserving regulatory compliance and preventing fraud.
Internal Controls for Data Security examines the threats to data security and provides context for the environments in which they flourish, as well as strategies for their mitigation. This course will provide you with an overview of basic internal controls, current threats facing data security and the potential consequences of technological trends such as cloud computing and Bring Your Own Device (BYOD).
Key Takeaways:
- Strategies for mitigating threats to data security
- How data is compromised from internal and external threats
- Legislative acts tied to data security
- Historical trends of technology and their effect on data security
- Types of environments in which data security threats thrive
Prerequisites
None
You Will Learn How To:
Ascertain the appropriate controls needed to secure data and prevent fraud
Choose the appropriate actions needed to protect information systems
Identify potential sources of data loss
Determine how data is compromised by employees and other external threats
Identify key legislative acts related to data security
Recognize technological trends and their impacts on data security
Table of Contents
Part I | Introduction to Internal Data Controls |
---|---|
Lesson 1 | Internal Controls |
Lesson 2 | Physical Access Controls |
Lesson 3 | Logical Access Controls |
Lesson 4 | Data Storage Controls |
Lesson 5 | Separation of Duties |
Part II | Data Security Risks |
Lesson 6 | Data Loss Prevention |
Lesson 7 | Perpetrators of Data Loss |
Lesson 8 | Consequences of Data Loss |
Part III | Current Data Threats |
Lesson 9 | Bring Your Own Device |
Lesson 10 | Securing the Cloud |
Lesson 11 | Social Media |
Lesson 12 | Conclusion |
CPE Information
CPE Credit: | 2 |
---|---|
NASBA Information: | Information Technology |
Advanced Preparation: | None |
Last Updated: | February 2023 |
Delivery Method: | QAS Self-Study |
Policies
CPE Credit
Please note: To be eligible for CPE credit, you must complete the final exam within one year of purchase date. You may only claim CPE credit for a course once.
ACFE Online Self-Study Courses
Features:
- 24/7 access to courses through your Internet browser
- Save time and quickly earn CPE credits with instant access, grading and printable certificate
- The flexibility to start or stop a course and pick-up right where you left off
- No additional shipping fees
Learn More about accessing your online self-study course
Learn More about online self-study courses and their features
System Requirements:
- Internet access: High-speed connection recommended
- Speakers required for video sound
The Association of Certified Fraud Examiners, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org/.
Ordering and Returns
Satisfaction Guarantee
If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.
Ordering & Returns Policy