Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
132 results found in 14 ms Page 8 of 14
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office , issued in 2015
Risk cases: $risks.size()
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
National Audit Office of Denmark , issued in 2015
Risk cases: 4
Australian Taxation Office: Administration of Australian Business Number Registrations
More elligibility and data integrity needed The Australian Business Number (ABN) and Australian Business Register initiatives were implemented as part of theGovernment's comprehensive reform of the taxation system in 2000. Their introduction involved challenging issues of technology and governance , including the imperative to process and register significant numbers of applications in a short time. Overall, the Australian SAI concluded that the ABN registration process is operating effectively. However, matters relating to the eligibility of some ABN applicants need to be reviewed. Further, some data integrity issues remain outstanding.
Full description
The Australian National Audit Office , issued in 2003
Risk cases: 3
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
previous 132 results found. Page 8 of 14 next