Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
> Area:"public order and safety"
Results found in 14 ms
  (Click on a topic/risk node to traverse and access the reports)
Area public order and safety Topic cyber-security Risk(s) identified: (Topic : cyber-security) too many domain administrators insufficient frequency of changing passwords for systems and service accounts no segregation of duties regarding access to the logging system no regular review of log files Topic application controls Risk(s) identified: (Topic : application controls) too many domain administrators insufficient frequency of changing passwords for systems and service accounts no segregation of duties regarding access to the logging system no regular review of log files lack of relevant documentation, internal control, audit and review lack of IT security policy insufficient input controls Topic legacy systems Risk(s) identified: (Topic : legacy systems) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic management dashboard Risk(s) identified: (Topic : management dashboard) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic agile projects Risk(s) identified: (Topic : agile projects) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic data center consolidation Risk(s) identified: (Topic : data center consolidation) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic indicative Risk(s) identified: (Topic : indicative) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified unclear governance and division of responsibilities insufficient data at coordination level Task not implemented in the processes of the organisation Insufficient conditions by Government Costs of the activity unknown building good information security is a heavy burden Topic directive Risk(s) identified: (Topic : directive) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Task not implemented in the processes of the organisation Insufficient conditions by Government Costs of the activity unknown building good information security is a heavy burden working hours not rearranged working hours not recorded regularly staffing levels not optimised lack of analysis where and when the problem is triggered no IT support Topic personal data protection Risk(s) identified: (Topic : personal data protection) lack of systemic risk assessments non-compliance with national legislation no cost assessments nor transparent data lack of non-disclosure agreements and inspections Topic organization's IT services Risk(s) identified: (Topic : organization's IT services) lack of systemic risk assessments non-compliance with national legislation no cost assessments nor transparent data lack of non-disclosure agreements and inspections lack of compliance with the internal regulations lack of training system lack of the copyrights to developed application lack of planning, monitoring and cooperation careful planning and organization no stable process of strategic planning lack of a common information architecture model no safety compliance assessments flaws in IT organisation lack of relevant documentation, internal control, audit and review lack of IT security policy insufficient input controls Topic IT architecture Risk(s) identified: (Topic : IT architecture) confidential personal data are not sufficiently protected lack of regulations concerning the protection of confidential data on a group of entities Topic government IT agency Risk(s) identified: (Topic : government IT agency) poor quality of data protection policy poor risk analysis insufficient screening of positions with access to confidential information insufficient preparation of public IT systems development all development delegated to IT unit needs of other agencies are seen as cumbersome and expensive incomplete or too general requirements insufficient monitoring lack of appropriate risk assessement Topic emergency preparedness Risk(s) identified: (Topic : emergency preparedness) unclear governance and division of responsibilities insufficient data at coordination level Topic internal control Risk(s) identified: (Topic : internal control) Task not implemented in the processes of the organisation Insufficient conditions by Government Costs of the activity unknown building good information security is a heavy burden Topic consultants Risk(s) identified: (Topic : consultants) Task not implemented in the processes of the organisation Insufficient conditions by Government Costs of the activity unknown building good information security is a heavy burden Topic cyber security Risk(s) identified: (Topic : cyber security) Task not implemented in the processes of the organisation Insufficient conditions by Government Costs of the activity unknown building good information security is a heavy burden Topic cost estimation Risk(s) identified: (Topic : cost estimation) insufficient preparation of public IT systems development all development delegated to IT unit needs of other agencies are seen as cumbersome and expensive poor senior management oversight interim analysis of unsuccessful programme not well implemented change of the programme assessment framework used ineffectively lack of IT strategy Lack of long term IT planning lack of needs evaluation User needs not met Topic measurement of project success Risk(s) identified: (Topic : measurement of project success) insufficient preparation of public IT systems development all development delegated to IT unit needs of other agencies are seen as cumbersome and expensive Topic phasing out old systems Risk(s) identified: (Topic : phasing out old systems) legal obstacles to data exchange complexity of conversion to new systems not assessed problems to acquire personnel with requisite skills Topic interoperability Risk(s) identified: (Topic : interoperability) indecisive management wrongly designed work process no stable process of strategic planning lack of a common information architecture model no safety compliance assessments flaws in IT organisation Topic outsourced systems Risk(s) identified: (Topic : outsourced systems) incomplete or too general requirements insufficient monitoring lack of appropriate risk assessement Topic digitization Risk(s) identified: (Topic : digitization) incomplete or too general requirements insufficient monitoring lack of appropriate risk assessement Topic job scheduling Risk(s) identified: (Topic : job scheduling) working hours not rearranged working hours not recorded regularly staffing levels not optimised lack of analysis where and when the problem is triggered no IT support Topic large scale project Risk(s) identified: (Topic : large scale project) network and hardware weakness in a supported area general training quality is too low poor non-IT infrastructure lack of monitoring and poor coordination