44
results found in
21 ms
Page 1
of 5
Cyber Attacks: Securing Agencies’ICT Systems
were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps. ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching
Full description
were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps. ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching
Full description
The Australian National Audit Office
, issued in 2014
Risk cases: 3
Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
General Accountability Office
, issued in 2016
Risk cases: 3
Performance Audit of the Georgian Government electronic Procurement system
and fraud, which in return supports the successful implementation of country’s anti-corruption policy. To develop such environment, the system must provide confidentiality, integrity and availability ... of existing data through effective procurement policies and procedures. <br /> Having considered aforementioned factors, SAO conducted performance audit of the Georgian electronic Government Procurement system ... . The audit was aimed to identify system’s shortcomings and issue recommendations to eliminate them. To accomplish audit objectives, the auditors assessed the performance of Ge-GP system’s management ... ... Electronic procurement system - how effective are management and control mechanisms? ... SAI Georgia analyzed the electronic Government Procurement system. In their report they focus on compliance and security problems, which may harm the business goals and overall mission of the system.
Full description
and fraud, which in return supports the successful implementation of country’s anti-corruption policy. To develop such environment, the system must provide confidentiality, integrity and availability ... of existing data through effective procurement policies and procedures. <br /> Having considered aforementioned factors, SAO conducted performance audit of the Georgian electronic Government Procurement system ... . The audit was aimed to identify system’s shortcomings and issue recommendations to eliminate them. To accomplish audit objectives, the auditors assessed the performance of Ge-GP system’s management ... ... Electronic procurement system - how effective are management and control mechanisms? ... SAI Georgia analyzed the electronic Government Procurement system. In their report they focus on compliance and security problems, which may harm the business goals and overall mission of the system.
Full description
State Audit Office Of Georgia
, issued in 2016
Risk cases: 5
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
National Audit Office of Denmark
, issued in 2015
Risk cases: 4
Products sold on the European market: unravelling the system of CE marking
Problems with general picture The Netherlands National Court of Audit was interested in finding out whether anyone keeps track of all the actors involved in the process of system of European Union product markings. The interest was aroused by an observation that the vast majority of the questions raised about the system were prompted by incidents and that the questioners did not generally appear to be interested in the operation of the system as a whole...
Full description
Problems with general picture The Netherlands National Court of Audit was interested in finding out whether anyone keeps track of all the actors involved in the process of system of European Union product markings. The interest was aroused by an observation that the vast majority of the questions raised about the system were prompted by incidents and that the questioners did not generally appear to be interested in the operation of the system as a whole...
Full description
The Netherlands Court of Audit
, issued in 2017
Risk cases: 5
Supply of food and medicinal products
Supply of food and medicinal products Deficiencies in emergency preparedness and weaknesses in governance are still found by the Swedish NAO in the system of safeguarding supply of food and medicinal products. The system is complex and NAO appreciates efforts made by responsible agencies. However, they found also insufficient clarity in division of responsibilities and weaknesses in coordinantion.
Full description
Supply of food and medicinal products Deficiencies in emergency preparedness and weaknesses in governance are still found by the Swedish NAO in the system of safeguarding supply of food and medicinal products. The system is complex and NAO appreciates efforts made by responsible agencies. However, they found also insufficient clarity in division of responsibilities and weaknesses in coordinantion.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 2
Audit of the procurement of ICT products with the potential to be standard products
ICT procurement system reviewed SFAO points out what is critical in ICT procurement. Requirements management is extremely important, as well as procurement strategies for relevant product groups. Legal rules should protect investments and support competition, but they can still be insufficient without appropriate reporting - if you want your system to adapt to changes.
Full description
ICT procurement system reviewed SFAO points out what is critical in ICT procurement. Requirements management is extremely important, as well as procurement strategies for relevant product groups. Legal rules should protect investments and support competition, but they can still be insufficient without appropriate reporting - if you want your system to adapt to changes.
Full description
Swiss Federal Audit Office
, issued in 2015
Risk cases: 4
Analysis of Trends in SAI Japan’s Findings
Analysis of IT audit cases by Board of Audit of Japan in years 2004-12. ... Not used IT systems and overpaid 'ghost' services ... Wrap-up of almost a decade of SAI of Japan's IT related audits results in a form of list of most often found problems. On the top of the list are unwanted or overpaid IT systems and too expensive ... maintanance. It makes you thinking: if one of the world technology leaders could find this, what could we find in our country...
Full description
Analysis of IT audit cases by Board of Audit of Japan in years 2004-12. ... Not used IT systems and overpaid 'ghost' services ... Wrap-up of almost a decade of SAI of Japan's IT related audits results in a form of list of most often found problems. On the top of the list are unwanted or overpaid IT systems and too expensive ... maintanance. It makes you thinking: if one of the world technology leaders could find this, what could we find in our country...
Full description
Board of Audit of Japan
, issued in 2014
Risk cases: 3
Storage of Electronic Documents and Data at the National Archives of Latvia
to electronic information systems, the role of the archives has become unclear — whether an inhabitant can rely on that the archives will be able to issue statements in the areas, which are currently processed ... Information Systems, State Revenue Service, Office of Citizenship and Migration Affairs, Court Administration, Register of Enterprises, and Riga District Court ... Ever since electronic documents with legal force equivalent to that of paper documents have entered our daily lives and the majority of state administration processes have been transferred ... ... Do Archives ensure the storage of e-documents? ... lives and majority of state administration processes have been transferred to electronic information systems, the archives still have a lot of work to do for improving the storage of electronic documents ... National archives fulfil an important function for storing the documentary heritage and became one of the most important sources of information. But after electronic documents have entered our daily ... . SAI Latvia analysed causes of over 12 years with no progress in this domain.
Full description
to electronic information systems, the role of the archives has become unclear — whether an inhabitant can rely on that the archives will be able to issue statements in the areas, which are currently processed ... Information Systems, State Revenue Service, Office of Citizenship and Migration Affairs, Court Administration, Register of Enterprises, and Riga District Court ... Ever since electronic documents with legal force equivalent to that of paper documents have entered our daily lives and the majority of state administration processes have been transferred ... ... Do Archives ensure the storage of e-documents? ... lives and majority of state administration processes have been transferred to electronic information systems, the archives still have a lot of work to do for improving the storage of electronic documents ... National archives fulfil an important function for storing the documentary heritage and became one of the most important sources of information. But after electronic documents have entered our daily ... . SAI Latvia analysed causes of over 12 years with no progress in this domain.
Full description
State Audit Office of the Republic of Latvia
, issued in 2015
Risk cases: 3
Digital transformation in government
Support exemplars, provide consistent guidance... and do not lose focus As the NAO states: Government faces significant challenges in providing public services. While many government services are now available online, public administration is struggling to manage more complicated programmes and to improve the complex systems and processes that support public services.
Full description
Support exemplars, provide consistent guidance... and do not lose focus As the NAO states: Government faces significant challenges in providing public services. While many government services are now available online, public administration is struggling to manage more complicated programmes and to improve the complex systems and processes that support public services.
Full description
National Audit Office
, issued in 2017
Risk cases: 4