Skip to main content

The WSCPA will be closing early at 2:00pm on Friday, May 23 and remain closed through Monday, May 26 in observance of Memorial Day.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography) WEBCAST

-

Add to Calendar

Your Desk

1.6 Credits

Member Price $59.00

Non-Member Price $79.00

Overview

The focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.

Highlights

Forensic accounting.

Prerequisites

None.

Designed For

Accountants, finance professionals, and auditors.

Objectives

Explore and examine the concepts of steganography. Discover and evaluate text steganography. Identify and evaluate image steganography. Explore and evaluate audio steganography. Discover and evaluate video steganography.

Preparation

None.

Notice

None.

Leader(s):

Leader Bios

Lynn Fountain, AICPA Learning

Lynn Fountain has over 35 years of experience spanning public accounting, corporate accounting and consulting. 20 years of the experience has been spent working in the areas of internal and external auditing. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial management and compliance. Ms. Fountain has held two Chief Audit Executive positions for international companies. She was a member of the senior leadership team for Aquila Inc. in Kansas City, MO, until the sale of the utility in 2008. At Aquila, she was responsible for Internal Audit, Enterprise Risk Management and Sarbanes-Oxley. She was an integral member of the senior leadership team that effectively executed the sale of the utility. Upon the close of Aquila, Ms. Fountain engaged in her own consulting and training business. During this time, she worked with several organizations to establish ERM, Sarbanes-Oxley and governance frameworks. In addition, she has developed and delivered leading edge training sessions on COSO, internal audit, ERM, accounting, leadership, governance, compliance and ethics. In 2011, Ms. Fountain was the Chief Audit Executive for an international construction and engineering firm in Kansas City. In this role she was involved in the active investigation of a joint venture fraud. The investigation included work with the FBI and ultimately led to indictment of the perpetrators and recovery of $13M. In 2012, Ms. Fountain returned to her consulting and training business. Along with her risk management, internal controls and financial accounting consulting work, she delivers training for the American Institute of Certified Public Accountants, Institute of Internal Auditors, and multiple seminar and training groups. In addition, Ms. Fountain is affiliated with Empower Audit Training and Consulting. Ms. Fountain is the author of two separate technical books released in 2015, The first entitled “Raise the Red Flag – The Internal Auditors Guide to Fraud Evaluations” was published by the Institute of Internal Auditors Research Foundation and released in April 2015. Her second book “Leading The Internal Audit Function” will be released in October 2015 by Auerbach Publications. This book serves as the initial launch for a series of leading practice internal audit and information technology publications. In addition, Ms. Fountain is a frequent blogger on the LinkedIn platform and has also had numerous articles published in professional and technical publications. She has performed as an adjunct instructor for the School of Business for Grantham University and developed the first internal audit curriculum for the School of Business at the University of Kansas. Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has her CGMA, CRMA credentials and CPA certificate.

Return to Top

Non-Member Price $79.00

Member Price $59.00