Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
142 results found in 14 ms Page 10 of 15
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Working of Inland Container Depots and Container Freight Stations
NEW! Online report on audit of SAI India With this first digital audit report of the Comptroller and Auditor General of India, new chapter has been opened in our profession: the online form is primary versus printable pdf. Advantages: high level of readability, live responsive charts, easy browsing and search of what users find interesting. The reported performance audit concerned 'dry ports', or multimodal logistics centres, which play growing role in domestic and international trade. It shows how gaps in concept and lax attitude to internal control can result on capacities, speed of trade, and enviromental safety.
Full description
Comptroller and Auditor General of India , issued in 2017
Risk cases: 5
Improving broadband
Lessons of Superfast Programme UK NAO's report on goverments extensive support to the superfast internet, with special focus on the Future Programme perspectives. Influence of the COVID-19 pandemic considered.
Full description
National Audit Office , issued in 2020
Risk cases: 7
The information system of the Public Real Estate Registry does not enable the recording of data in a completely efficient manner
Users to be involved SAI Serbia analysed the Public Real Estate Registry. Starting from missing involvement of users, primary goals of the project were not met. Key issues regarding data input and access are discussed in the text.
Full description
State Audit Institution , issued in 2019
Risk cases: 3
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Coordinated Audit on Information Technology Governance
IT governance needs awareness and SAIs' support The OLACEFS auditors found that the greatest challenge for the SAIs is to raise the awareness of the audit institutions about the importance of IT governance and the benefits that could be obtained by improving its degree of maturity. The audit was conducted by 11 SAIs and coordinated by TCU of Brasil. They concluded: 'It is important, even urgent, to invest resources to implement or enhance: the IT committees; the IT planning process; strategic IT planning; monitoring the IT contracting process; the business continuity plan; the designation of a responsible person or unit to manage security information; a risk management process; an asset inventory process; an information security committee; and a policy for access control.'
Full description
Latin American andCaribbean Organization of Supreme Audit Institutions , issued in 2015
Risk cases: 5
Electronic Records. Management and Preservation Pose Challenges
Basics of electronic records management This audit of GAO, reported in 2003, can be helpful in looking for basic problems in electronic records management. These problems are compounded as computer hardware, application software, and even storage media become obsolete, as they may leave behind electronic records that can no longer be read.
Full description
General Accountability Office , issued in 2003
Risk cases: 7
Audit on the operation of the “Ministry of Finance” Central Budget Chapter
The audit was carried out on the "Ministry of Finance" central budget chapter and covered the period of 2003-2008. One of the audited activities of the Ministry were the IT systems ... and their development and the role of the Hungarian State Treasury within the IT framework of public finances. ... ... Simple receipt: calculate costs, standardize data, divide duties... ... Hungarian Audit Office analyzed in detail fundamentals of proper IT investment taking into account problems of Budget Management System.
Full description
State Audit Office of Hungary , issued in 2008
Risk cases: 3
Management and development of IT systems in the Ministry of the Environment
The purpose of this audit was to assess whether the information systems in the area of government of the Ministry of the Environment (and their development) support the reliable, economical ... and sustainable collection and use of environmental information. On a broader scale the National Audit Office looked at all of the 42 environmental information systems created in the area of government ... of the Ministry of Environment, but focused in greater detail on four of them: the Environmental Register, the Estonian Nature Information System, the Environmental Permits Information System and the Land Cadastre ... ... Estonian environmental information system needs reforms ... Correctness and reliability of the environmental data is guaranteed to a considerable extent. However there is a need for redevelopment of environmental information systems, particularly ... by the Environmental Register.
Full description
National Audit Office of Estonia , issued in 2013
Risk cases: 2
previous 142 results found. Page 10 of 15 next