Information Security

Information Security

Author: Nancy R. Kingsbury

Publisher: DIANE Publishing

Published: 2009-05

Total Pages: 38

ISBN-13: 1437913156

DOWNLOAD EBOOK

The Financial Crimes Enforcement Network (FinCEN) relies extensively on its own computer systems, as well as those at the IRS to administer the Bank Secrecy Act (BSA) and fulfill its mission of safeguarding the U.S. financial system from financial crimes. Effective info. security controls over these systems are essential to ensuring that BSA data, which contains sensitive financial info. used by law enforcement agencies to prosecute financial crime, is protected from inappropriate or deliberate misuse, improper disclosure, or destruction. This report evaluated whether security controls that effectively protect the confidentiality, integrity, and availability of the info. and systems that support FinCEN's mission have been implemented. Illus.


Information Security

Information Security

Author: United States Government Accountability Office

Publisher: Createspace Independent Publishing Platform

Published: 2018-01-18

Total Pages: 32

ISBN-13: 9781983965937

DOWNLOAD EBOOK

Information Security: IRS Needs to Address Pervasive Weaknesses


Information Security

Information Security

Author: Gene Aloise

Publisher: DIANE Publishing

Published: 2009-03

Total Pages: 49

ISBN-13: 1437910289

DOWNLOAD EBOOK

The Los Alamos National Lab. (LANL) has experienced security lapses protecting information on its unclassified computer network. The unclassified network contains sensitive information. This report: (1) assessed the effectiveness of the security controls LANL has in place to protect information transmitted over its unclassified computer network; (2) assessed whether LANL had implemented an information security program for its unclassified network; and (3) examined expenditures to protect LANL¿s unclassified network from FY 2001 through 2007. The author examined security policies and procedures and reviewed the laboratories' access controls for protecting information on the unclassified network. Includes recommendations. Illustrations.


Internal Revenue Service

Internal Revenue Service

Author: Steven J. Sebastian

Publisher: DIANE Publishing

Published: 2010

Total Pages: 98

ISBN-13: 1437918522

DOWNLOAD EBOOK

In its role as the nation's tax collector, the IRS has a demanding responsibility to annually collect trillions of dollars in taxes, process hundreds of millions of tax and information returns, and enforce the nation's tax laws. Since its first audit of IRS's financial statements in FY 1992, the auditor has identified a number of weaknesses in IRS's financial management operations. In related reports, he has recommended corrective actions to address those weaknesses. The purpose of this report is to: (1) provide the status of audit recommendations and actions needed to fully address them; and (2) demonstrate how the recommendations relate to control activities central to IRS's mission and goals. Charts and tables.


Information Security

Information Security

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

Published: 2009-11

Total Pages: 66

ISBN-13: 1437919383

DOWNLOAD EBOOK

Weaknesses in info. security (IS) are a widespread problem that can have serious consequences -- such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable info. -- and has identified IS as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. IS Mgmt. Act of 2002 (FISMA), which authorized and strengthened IS program, evaluation, and reporting requirements for fed. agencies. This report evaluates: (1) the adequacy and effectiveness of agencies' IS policies and practices; and (2) fed. agencies' implementation of FISMA requirements. Includes recommendations. Illustrations.


Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

Published: 2010-11

Total Pages: 24

ISBN-13: 1437925650

DOWNLOAD EBOOK

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.


High-Risk Series

High-Risk Series

Author: Gene L. Dodaro

Publisher: DIANE Publishing

Published: 2009-12

Total Pages: 99

ISBN-13: 1437913032

DOWNLOAD EBOOK

The fed. gov¿t. is the world's largest and most complex entity, with about $3 trillion in outlays in FY 2008. Reports on high-risk areas bring focus to areas needing attention due to their greater vulnerabilities to fraud, waste, abuse, and mismanagement. These reports also identify areas needing transformation to address major economy, efficiency, or effectiveness challenges. This 2009 update presents the status of high-risk areas listed in 2007 and identifies new high-risk areas. Solutions to high-risk problems offer the potential to save billions of dollars, dramatically improve service to the public, strengthen confidence and trust in the performance and accountability of the U.S. gov¿t., and ensure the ability of gov¿t. to deliver on its promises. Illus.


Information Security

Information Security

Author: United States Government Accountability Office

Publisher: Createspace Independent Publishing Platform

Published: 2017-09-09

Total Pages: 32

ISBN-13: 9781976206139

DOWNLOAD EBOOK

The Internal Revenue Service (IRS) relies extensively on computerized systems to carry out its demanding responsibilities to collect taxes (about $2.7 trillion in fiscal year 2007), process tax returns, and enforce the nation's tax laws. Effective information security controls are essential to ensuring that financial and taxpayer information is adequately protected from inadvertent or deliberate misuse, fraudulent use, improper disclosure, or destruction. As part of its audit of IRS's fiscal years 2007 and 2006 financial statements, GAO assessed (1) IRS's actions to correct previously reported information security weaknesses and (2) whether controls were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, GAO examined IRS information security policies and procedures, guidance, security plans, reports, and other documents; tested controls over key financial applications at three IRS data centers; and interviewed key security representatives and management officials. GAO is recommending that the Acting Commissioner take several


Cyberterrorism

Cyberterrorism

Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations

Publisher:

Published: 2003

Total Pages: 208

ISBN-13:

DOWNLOAD EBOOK