4
results found in
3 ms
Page 1
of 1
Does the Admin PKI correspond to the original objectives and the needs of the Federal Administration and the Cantons?
The SFAO has audited the Admin PKI, the basic infrastructure and offering for the issuing of digital certificates within the Federal Office of Information Technology, Systems and Telecommunication ... (FOITT). The examination concentrated on assessing the development and current operation as well as future prospects. Admin PKI refers to all processes and the hardware and software needed for issuing ... certificates of different grades. ... Internal coordination can be more difficult than the external one ... A successful project of digital certificates distribution had difficult time when main Government players disagreed.
Full description
The SFAO has audited the Admin PKI, the basic infrastructure and offering for the issuing of digital certificates within the Federal Office of Information Technology, Systems and Telecommunication ... (FOITT). The examination concentrated on assessing the development and current operation as well as future prospects. Admin PKI refers to all processes and the hardware and software needed for issuing ... certificates of different grades. ... Internal coordination can be more difficult than the external one ... A successful project of digital certificates distribution had difficult time when main Government players disagreed.
Full description
Swiss Federal Audit Office
, issued in 2010
Risk cases: 1
Management of State Information Resources
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... was conducted on the assumption that the audited and other entities provided comprehensive and objective information and copies of the documents correspond to the originals. ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... was conducted on the assumption that the audited and other entities provided comprehensive and objective information and copies of the documents correspond to the originals. ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2013
Risk cases: 3
Management and implementation of 1BestariNet
Solution. 1BestariNet serves as a major catalyst for internet penetration in Malaysia as well as the projected increase in national income. AUDIT OBJECTIVE: The audit was carried out to evaluate whether ... the management and implementation of 1BestariNet was carried out economically, efficiency and effectively to achieve the inttended objectives. AUDIT SCOPE: The audit scope includes planning, implementation ... 1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
Solution. 1BestariNet serves as a major catalyst for internet penetration in Malaysia as well as the projected increase in national income. AUDIT OBJECTIVE: The audit was carried out to evaluate whether ... the management and implementation of 1BestariNet was carried out economically, efficiency and effectively to achieve the inttended objectives. AUDIT SCOPE: The audit scope includes planning, implementation ... 1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
National Audit Department of Malaysia
, issued in 2013
Risk cases: 4
THE CYBER SECURITY ENVIRONMENT IN LITHUANIA
and electronic information security as well as the funds allocated and used in this area. The SAI evaluated whether the cyber security and electronic information security objectives detailed in planning documents ... The purpose of the audit was to assess whether cyber security is being ensured in Lithuania. In view of this goal, we assessed whether: (1) an effective cyber security system has been set up; (2 ... ) cyber security is ensured in public establishments. During the audit, the SAI Lithuania analysed current regulation, strategic planning and management practices in the field of cyber security ... ... Cyber-security is much more than preventing incidents ... SAI Lithuania determined that the issue of ensuring and increasing cyber security and resilience has not been effectively addressed at the national level. The focus has primarily been on reacting ... to and preventing incidents in cyber space, which means that traditional issues related to electronic information security (confidentiality, integrity, accessibility) have been neglected, and from 2015, not enough ... attention has been paid to development, legislation, improvement of organisational structure, etc. in this field.
Full description
and electronic information security as well as the funds allocated and used in this area. The SAI evaluated whether the cyber security and electronic information security objectives detailed in planning documents ... The purpose of the audit was to assess whether cyber security is being ensured in Lithuania. In view of this goal, we assessed whether: (1) an effective cyber security system has been set up; (2 ... ) cyber security is ensured in public establishments. During the audit, the SAI Lithuania analysed current regulation, strategic planning and management practices in the field of cyber security ... ... Cyber-security is much more than preventing incidents ... SAI Lithuania determined that the issue of ensuring and increasing cyber security and resilience has not been effectively addressed at the national level. The focus has primarily been on reacting ... to and preventing incidents in cyber space, which means that traditional issues related to electronic information security (confidentiality, integrity, accessibility) have been neglected, and from 2015, not enough ... attention has been paid to development, legislation, improvement of organisational structure, etc. in this field.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2015
Risk cases: 6
4
results found.
Page 1
of 1