Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
35 results found in 10 ms Page 1 of 4
Cyber Attacks: Securing Agencies’ICT Systems
. In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... responsibility of agencies, having regard to their business operations and specific risks. In the context of a national government, those risks can range from threats to national security through to the disclosure ... agencies compliance with the four mandatory ICT security strategies and related controls in the Australian Government Information Security Manual (ISM). The audit also considered the overall ICT security ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
General Accountability Office , issued in 2016
Risk cases: 3
Information security work at nine agencies
Difficulties in achieving appropriate IT security Together with the Swedish NAO we assume that the picture that emerges at the agencies audited applies also to most of the other agencies in the public administration. The information security work is not given high enough priority in relation to the risks that exist. This applies to both the Government, which should have been clearer in its directions to agencies on this matter, and to agency managements, which did not give priority to the work of information security to the extent required. Much indicates that it is difficult for many agencies to achieve an appropriate level of information security work.
Full description
Swedish National Audit Office , issued in 2016
Risk cases: 4
Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
General Accountability Office , issued in 2012
Risk cases: 4
The National Government Service Centre – Has administration become more effective?
The purpose of this audit has been to investigate whether the Service Centre has made administrative operational support functions taken over from client agencies more effective, and to find ... explanations for the results so far achieved by the Service Centre. The audit has also aspired to illustrate how agencies that do not subscribe to the services regard their potential for doing so ... . These viewpoints have been analysed with a special focus on the conditions that applied to the Service Centre when it was formed and the measures taken by the Government and the Service Centre in the first years. ... ... Has Swedish public administration become more effective? ... The Service Centre – payroll and financial administration IT system for Swedish public agencies under the government – has achieved the target of a subscription rate of 25 per cent of the total ... of agencies' subscription to the Service Centre’s services was limited to start with. For example, the Service Centre’s operational targets for subscription did not refer to agency size, which is important ... in achieving economies of scale. In addition, the Government has instructed agencies to review the question of subscription and report their reasons for delaying subscription.
Full description
Swedish National Audit Office , issued in 2016
Risk cases: 2
Supply of food and medicinal products
Supply of food and medicinal products Deficiencies in emergency preparedness and weaknesses in governance are still found by the Swedish NAO in the system of safeguarding supply of food and medicinal products. The system is complex and NAO appreciates efforts made by responsible agencies. However, they found also insufficient clarity in division of responsibilities and weaknesses in coordinantion.
Full description
Swedish National Audit Office , issued in 2018
Risk cases: 2
Higher education institutions' provision of premises- room for improvement
How to pay for higher education institutions' premises Higher education institutions' rental costs constitute a significant part of central government rental expenses. Swedish NAO analysed results of reform, which aimed at more effective use of resources at central government agencies and more effective management of real property and assets for the State as a whole. Apart from the positive results as a whole, substantial room for improvement still exists: especially in identifying targets of costs, looking for incentives and in mitigating commercial approach to education institutions.
Full description
Swedish National Audit Office , issued in 2018
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Protection of automatically processed personal data
of the Interior, Information Society Development Committee under the Ministry of Transport and Communications, and public establishment Central Project Management Agency. ... Over the past few years, a number of legal, management, supervision, information, and methodological issues related to the protection of personal data have piled up. As they have not been fully ... resolved,the National Audit Office conducted an audit to assess the efficiency of the protection and supervision of automatically processed personal data and to check whether: - the regulation of personal data ... ... Data protection needs a long term strategy ... Rapid development of information and communication technology continuously brings about issues of personal data protection. Due to lack of long-term vision in this area they are frequently ... not addressed by the existing legislation. Moreover, SAI of Lithuania revealed failures in organization and control of personal data protection by public sector.
Full description
National Audit Office of the Republic of Lithuania , issued in 2013
Risk cases: 2
Use of European Union funds in promoting information society
The National Audit Office audited the use of the aid allocated from the structural funds of the European Union (hereinafter EU aid) in the information technology (IT) area of the state. The National ... Audit Office checked whether the distribution of funds for the development of the information society has been balanced and transparent, and whether the distribution of aid is adequately supervised ... . Balanced distribution of aid means that development of the information society entails paying attention (and ideally providing proportional funding) to information systems aimed at the public sector, private ... Riigikontroll auditeeris Euroopa Liidu struktuurifondidest ehk tõukefondidest eraldatud toetuste (edaspidi ELi toetusraha) kasutamist riigi infotehnoloogia (IT) valdkonnas. Uuriti, kas raha jagamine ... infoühiskonna arendamise eesmärgil on olnud tasakaalustatud ja läbipaistev ning kas toetuste jagamise üle tehakse piisavat järelevalvet. Riigikontrolli hinnangul on riik infoühiskonna arengukava rakendamiseks ... toetuste jagamisel keskendunud liiga riigile suunatud IT-arenduste rahastamisele ning jätnud tagaplaanile ettevõtete konkurentsivõime parandamisele ja kolmandale sektorile suunatud IT arendusprojektide ... Balance needed for success of Information Society Development Plan ... 50% of aid has been granted primarily for the development of information systems of state agencies, i.e. as much as the other two target groups - business and citizens - put together. Information ... , true suppervision and measurement of progress are listed by the Estonian SAI as next key elements necessary to keep balanced development of strategy for Information Society.
Full description
National Audit Office of Estonia , issued in 2012
Risk cases: 2
35 results found. Page 1 of 4 next