Keeping Taxpayer Data Secure Study Guide
The study guide is provided to guide you through the course material in a step by step format.
Reading assignments are for “Keeping Taxpayer Data Secure.”
1) Introduction to Cybercrime
Reading Assignment: Chapter 1 <<>> Review Questions: # 1-3
The learning objectives for this lesson are to gain an understanding of:
- Identify the source of the most frequent type of malicious access to a firm’s taxpayer information;
- List the most common types of cyber attack;
- Describe how a denial-of-service attack operates to impede business operations; and
- Recognize the dangers of Trojan horses.
2) Laws & Regulations Safeguarding Taxpayer Data
Reading Assignment: Chapter 2 <<>> Review Questions: # 1-2
The learning objectives for this lesson are to gain an understanding of:
- List the principal federal laws and regulations governing the security of taxpayer information;
- Understand the objectives and requirements of the Safeguards Rule;
- Identify the notification requirements imposed by the Financial Privacy Rule; and
- Distinguish between a customer and a consumer under FTC regulations.
3) The Costs of a Data Breach
Reading Assignment: Chapter 3 <<>> Review Question: # 1-2
The learning objectives for this lesson are to gain an understanding of:
- List the principal causes of a data breach involving customer records;
- Identify the investigation and remediation activities normally undertaken by an organization following a data breach involving customer information;
- Recognize the average costs of a data breach in the United States; and
- Understand the probability of a business experiencing a data breach within the next 24 months.
4) The Information Security Plan
Reading Assignment: Chapter IV <<>> Review Questions: # 1-2
The learning objectives for this lesson are to gain an understanding of:
- Recognize the function of a firm’s Information Security Plan;
- List the principal sections of an Information Security Plan;
- Identify the role of an Information Security Plan’s physical security procedures; and
- Describe the elements comprising a firm’s information and computer system.
5) Best Practices for Securing Data
Reading Assignment: Chapter 5 <<>> Review Questions: # 1-2
The learning objectives for this lesson are to gain an understanding of restrictions concerning accepting assistance from:
- List the data use and retention areas generally vulnerable to unauthorized access of taxpayer information; and
- Identify best practices for securing taxpayer information.
6) When a Data Breach Occurs
Reading Assignment: Chapter 6 <<>> Review Questions: 1-2
The learning objectives for this lesson are to gain an understanding of:
- Identify the steps that should be taken by a business to stop or limit additional data loss if a data breach has occurred involving its clients;
- Recognize the need for a comprehensive communications plan;
- List the entities that should be notified in the event of a data breach; and
- Identify the additional protections that may be recommended if a data breach involves the compromise of clients’ Social Security numbers.
Recent Comments