Information Assurance. What Does a Controller Do? Protect the Assets of the Hotel Property & Equipment Information Systems Cash and Banking In Charge.

Slides:



Advertisements
Similar presentations
Chapter 8 BBI1O1. Opening Activity What do you OWN? What do you OWE? What I OWN – What I OWE = Personal Net Worth.
Advertisements

Tim Allen bio: Deloitte & Touche, audit & tax, wine clients1992 – 1996 La Crema, controller1996 – 1997 Sonoma-Cutrer, CFO1997 – 2002 Arrowood (Mondavi),
Computer Threats I can understand computer threats and how to protect myself from these threats.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Finance Foundations Unit 5 Flash Cards Mrs. Sorrell.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
© The McGraw-Hill Companies, Inc., 2002 McGraw-Hill/Irwin Financial & Managerial Accounting The Basis for Business Decisions TWELFTH EDITION Williams Haka.
Finance and Accounting Department Pertemuan 12 Matakuliah: G0424 – Hotel and Restaurant Management Tahun: 2008.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
WHAT IS ACCOUNTING? Accounting is the identifying, recording and communication of financial events that affect a company.
4.01 Accounting and Finance. What is Accounting? Method of reporting financial activity of a business Financial transactions recorded in an orderly fashion.
CREDIT CARDS What are they and how do they work?.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Internet Safety Portage Department of Public Safety.
WELCOME ! Client & Alumni CPE Forum December 10, 2008 Opening Remarks Howard Cohen Managing Partner, Amper, Politziner & Mattia Speakers: Tom Mulhare CPA,
Protecting Yourself Online (Information Assurance)
Cyber Crimes.
Chapter 8 Section 1 The income statement. Step #7 in the accounting cycle Our job now is to take the information and place it on financial sheet so that.
Real-estate Management System
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
The Bahamas Presentation at Bay Gardens Hotel Castries, Saint Lucia 24 th July 2006.
2011 Year-end Financial Report. Denman Island Volunteer Fire Department 2011 Year-end Financial Report Revenue Operating Grant 99,000. Rent 523. Donations.
Role of Accounting Records 1.Establishing accountability for the assets and or transactions under an individual’s control. 2.Keeping track of routine business.
7 Information Security.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Buying equipment with Cash 1 Equipment (Asset) Cash (Asset) + - Debit Credit Debit Credit.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Sheldon Independent School District Annual Financial and Compliance Audit Board of Trustees Presentation January 19, 2010.
Single Company Accounts Highwood June Deferred tax  From question 27m x 25 % = 6750  Excluded from P&L x 25%= 3750*  Required 3000  Existing.
Geotechnical Construction EMS Job Cost Equipment Cost Budget Recaps CASEWIRED ABRA (HR) Equipnet Inventory Job Mgr Added External Systems More Interface.
EPA ASA INFORMATION CLASS MODEL Level 1 EPA ASA Financial Human Assets Capital Assets Acquisition Assistance Location Appendix G 1 21 October 2001.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Chapter 5 The Balance Sheet – Equity Section
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
JOSIE D. ALBAO DOST V-PMU Financial Assumptions Financial Projections Return on Investment Partial Budget Analysis.
By :Mitchell Christie by :Mitchell Christie safety.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Credit and Credit Cards Costs and Benefits of Having a Credit Card ©2012, TESCCC.
1. »Are vital because a business cannot exist without cash flow »Focus on the following: –creating up-to-date, accurate financial statements –making a.
Business Administration Unit 5 Financial Management Chapter 15 Financial Records in a Business.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PROPERTY PLANT AND EQUIPMENT JOURNAL ENTRIES LAND WAS PURCHASED FOR $10,000 OF CASH.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
Group 4 P9-5. A. Debit Credit Wages expense (+E, -SE) $3,600 Wages payable (+L)..………… $3,600 Wages payable (+L)..………… $3,600 Stockholders Stockholders.
Problem 2-5 Group 1 Nairi Anida Southyda Luke Alex.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Accounting Guru Cloud ERP (Enterprise Resource Planning) ERP Software https:
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Challenges in making India a cashless economy.
Statement of Revenues, Expenditures, and Changes in Fund Balance
Anything of Value Owned by the Business
The Accounting Cycle: Step 4
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Managing Working Capital and Controlling Cash
TECHNOLOGY.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
هجرة الشباب الدولية والتنمية الفرص والتحديات
Section 1 The income statement
Cyber Security Experts
Accounting process.
Every “T” Account has: An Increase Side, and A Decrease Side
Understanding Financial Statements
Business Financial Records
Security in mobile technologies
Presentation transcript:

Information Assurance

What Does a Controller Do? Protect the Assets of the Hotel Property & Equipment Information Systems Cash and Banking In Charge of all Financial Activity Payroll, Payables, Receivables, Revenues, Budgets, Forecasts, Capital

M.I.B

Who was able to see the aliens? Who was looking out for threats?

If you connect to Wi-Fi in a public place on your Tablet, Mobile Phone, or Laptop: Hackers can use SNIFFERS to see your internet communications. They can capture your: User Name Passwords Credit Card

In my career I have been the watch dog for my company. I have caught many people stealing from my company. Some lost their jobs and some ended up in jail. The future of my work & the future of crime will be in Information Systems and the Cyber World.

Careers in Information Assurance: FBI CIA NSA Accountants & Auditors Information Systems Administrators

Instructor: Professor Alessandro 'Alex' Seazzu

Questions?