Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
4 results found in 4 ms Page 1 of 1
Individual Operation System Development Projects
Audit of modernization of Patent Operation MGT Systems. The modernization's main aim was to replace existing multi-system structure of patents management with one consolidated and up-to-technology IS. ... No results without good management ... SAI of Japan, among its audits presents one which is concerned with stopped development of consolidated IT system for patents management.
Full description
Board of Audit of Japan , issued in 2012
Risk cases: 1
Cyber Attacks: Securing Agencies’ICT Systems
of sensitive personal information. Unauthorised access through electronic means, also known as cyber intrusions, can result from the actions of outside individuals or organisations. Individuals operating from ... Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
National Audit Office of Denmark , issued in 2015
Risk cases: 4
Audit of the key ICT project regarding a consumption tax platform Federal Customs Administration (FCA)
The Swiss Federal Audit Office (SFAO) audited the key ICT project concerning a consumption tax platform from May to June 2015. The programme was launched in January 2014 with a budget of CHF 13.5 ... million. The instructing parties were the management of the Federal Customs Administration (FCA), the Swiss Alcohol Board (SAB) and the Federal Office of Information Technology, Systems ... and Telecommunication (FOITT). ... ... First attempt to ITC consumption tax project ... SAI Switzerland analised problems steming from insufficient specification of a complex ICT system project concerning a consumption tax platform. The project's budget turned out to cover only 70 ... % of the expected functions. Suspension of the project and restarting preparations stage followed.
Full description
Swiss Federal Audit Office , issued in 2015
Risk cases: 1
4 results found. Page 1 of 1