Information Security: IRS Needs to Address Pervasive Weaknesses
Author:
Publisher: DIANE Publishing
Published: 2007
Total Pages: 30
ISBN-13: 9781422396445
DOWNLOAD EBOOKRead and Download eBook Full
Author:
Publisher: DIANE Publishing
Published: 2007
Total Pages: 30
ISBN-13: 9781422396445
DOWNLOAD EBOOKAuthor: Nancy R. Kingsbury
Publisher: DIANE Publishing
Published: 2009-05
Total Pages: 38
ISBN-13: 1437913156
DOWNLOAD EBOOKThe Financial Crimes Enforcement Network (FinCEN) relies extensively on its own computer systems, as well as those at the IRS to administer the Bank Secrecy Act (BSA) and fulfill its mission of safeguarding the U.S. financial system from financial crimes. Effective info. security controls over these systems are essential to ensuring that BSA data, which contains sensitive financial info. used by law enforcement agencies to prosecute financial crime, is protected from inappropriate or deliberate misuse, improper disclosure, or destruction. This report evaluated whether security controls that effectively protect the confidentiality, integrity, and availability of the info. and systems that support FinCEN's mission have been implemented. Illus.
Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
Published: 2018-01-18
Total Pages: 32
ISBN-13: 9781983965937
DOWNLOAD EBOOKInformation Security: IRS Needs to Address Pervasive Weaknesses
Author: Gene Aloise
Publisher: DIANE Publishing
Published: 2009-03
Total Pages: 49
ISBN-13: 1437910289
DOWNLOAD EBOOKThe Los Alamos National Lab. (LANL) has experienced security lapses protecting information on its unclassified computer network. The unclassified network contains sensitive information. This report: (1) assessed the effectiveness of the security controls LANL has in place to protect information transmitted over its unclassified computer network; (2) assessed whether LANL had implemented an information security program for its unclassified network; and (3) examined expenditures to protect LANL¿s unclassified network from FY 2001 through 2007. The author examined security policies and procedures and reviewed the laboratories' access controls for protecting information on the unclassified network. Includes recommendations. Illustrations.
Author: Steven J. Sebastian
Publisher: DIANE Publishing
Published: 2010
Total Pages: 98
ISBN-13: 1437918522
DOWNLOAD EBOOKIn its role as the nation's tax collector, the IRS has a demanding responsibility to annually collect trillions of dollars in taxes, process hundreds of millions of tax and information returns, and enforce the nation's tax laws. Since its first audit of IRS's financial statements in FY 1992, the auditor has identified a number of weaknesses in IRS's financial management operations. In related reports, he has recommended corrective actions to address those weaknesses. The purpose of this report is to: (1) provide the status of audit recommendations and actions needed to fully address them; and (2) demonstrate how the recommendations relate to control activities central to IRS's mission and goals. Charts and tables.
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Published: 2009-11
Total Pages: 66
ISBN-13: 1437919383
DOWNLOAD EBOOKWeaknesses in info. security (IS) are a widespread problem that can have serious consequences -- such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable info. -- and has identified IS as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. IS Mgmt. Act of 2002 (FISMA), which authorized and strengthened IS program, evaluation, and reporting requirements for fed. agencies. This report evaluates: (1) the adequacy and effectiveness of agencies' IS policies and practices; and (2) fed. agencies' implementation of FISMA requirements. Includes recommendations. Illustrations.
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Published: 2010-11
Total Pages: 24
ISBN-13: 1437925650
DOWNLOAD EBOOKPervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.
Author: Gene L. Dodaro
Publisher: DIANE Publishing
Published: 2009-12
Total Pages: 99
ISBN-13: 1437913032
DOWNLOAD EBOOKThe fed. gov¿t. is the world's largest and most complex entity, with about $3 trillion in outlays in FY 2008. Reports on high-risk areas bring focus to areas needing attention due to their greater vulnerabilities to fraud, waste, abuse, and mismanagement. These reports also identify areas needing transformation to address major economy, efficiency, or effectiveness challenges. This 2009 update presents the status of high-risk areas listed in 2007 and identifies new high-risk areas. Solutions to high-risk problems offer the potential to save billions of dollars, dramatically improve service to the public, strengthen confidence and trust in the performance and accountability of the U.S. gov¿t., and ensure the ability of gov¿t. to deliver on its promises. Illus.
Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
Published: 2017-09-09
Total Pages: 32
ISBN-13: 9781976206139
DOWNLOAD EBOOKThe Internal Revenue Service (IRS) relies extensively on computerized systems to carry out its demanding responsibilities to collect taxes (about $2.7 trillion in fiscal year 2007), process tax returns, and enforce the nation's tax laws. Effective information security controls are essential to ensuring that financial and taxpayer information is adequately protected from inadvertent or deliberate misuse, fraudulent use, improper disclosure, or destruction. As part of its audit of IRS's fiscal years 2007 and 2006 financial statements, GAO assessed (1) IRS's actions to correct previously reported information security weaknesses and (2) whether controls were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, GAO examined IRS information security policies and procedures, guidance, security plans, reports, and other documents; tested controls over key financial applications at three IRS data centers; and interviewed key security representatives and management officials. GAO is recommending that the Acting Commissioner take several
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
Published: 2003
Total Pages: 208
ISBN-13:
DOWNLOAD EBOOK