Computer networks (41 - 50 of 79 items)
Information Security: Federal Agencies Need to Improve Controls over Wireless Networks
GAO-05-383: Published: May 17, 2005. Publicly Released: May 17, 2005.
The use of wireless networks is becoming increasingly popular. Wireless networks extend the range of traditional wired networks by using radio waves to transmit data to wireless-enabled devices such as laptops. They can offer federal agencies many potential benefits but they are difficult to secure. GAO was asked to study the security of wireless networks operating within federal facilities. This...
Information Security: Securities and Exchange Commission Needs to Address Weak Controls over Financial and Sensitive Data
GAO-05-262: Published: Mar 23, 2005. Publicly Released: Mar 23, 2005.
The Securities and Exchange Commission (SEC) relies extensively on computerized systems to support its financial and mission-related operations. As part of the audit of SEC's fiscal year 2004 financial statements, GAO assessed the effectiveness of the commission's information system controls in protecting the integrity, confidentiality, and availability of its financial and sensitive information.S...
Technology Assessment: Cybersecurity for Critical Infrastructure Protection
GAO-04-321: Published: May 28, 2004. Publicly Released: May 28, 2004.
Computers are crucial to the operations of government and business. Computers and networks essentially run the critical infrastructures that are vital to our national defense, economic security, and public health and safety. Unfortunately, many computer systems and networks were not designed with security in mind. As a result, the core of our critical infrastructure is riddled with vulnerabilities...
Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems
GAO-04-628T: Published: Mar 30, 2004. Publicly Released: Mar 30, 2004.
Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. At the request...
Information Security: Further Efforts Needed to Address Serious Weaknesses to USDA
GAO-04-154: Published: Jan 30, 2004. Publicly Released: Mar 1, 2004.
The U.S. Department of Agriculture (USDA) performs critical missions that enhance the quality of life for the American people, relying on automated systems and networks to deliver billions of dollars in programs to its customers; process and communicate sensitive payroll, financial, and market data; and maintain personal customer information. Interruptions in USDA's ability to fulfill its missions...
Information Security: Status of Federal Public Key Infrastructure Activities at Major Federal Departments and Agencies
GAO-04-157: Published: Dec 15, 2003. Publicly Released: Jan 14, 2004.
The federal government is increasingly using online applications to provide access to information and services and to conduct internal business operations. In light of this trend, strong security assurances are needed to properly safeguard sensitive, personal, and financial data, in part by ensuring that the identities of those who use such applications are appropriately authenticated. When fully...
Critical Infrastructure Protection: Challenges in Securing Control Systems
GAO-04-140T: Published: Oct 1, 2003. Publicly Released: Oct 1, 2003.
Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines; in the electric power industry, they can monitor and control the current and voltage of electricity through relays and circuit breakers; and in water treatment facilities, th...
Information Security: Further Efforts Needed to Fully Implement Statutory Requirements in DOD
GAO-03-1037T: Published: Jul 24, 2003. Publicly Released: Jul 24, 2003.
The Department of Defense (DOD) faces many risks in its use of globally networked computer systems to perform operational missions--such as identifying and tracking enemy targets--and daily management functions--such as paying soldiers and managing supplies. Weaknesses in these systems, if present, could give hackers and other unauthorized users the opportunity to modify, steal, inappropriately di...
FDIC Information Security: Progress Made but Existing Weaknesses Place Data at Risk
GAO-03-630: Published: Jun 18, 2003. Publicly Released: Jun 18, 2003.
Effective controls over information systems are essential to ensuring the protection of financial and personnel information and the security and reliability of bank examination data maintained bythe Federal Deposit Insurance Corporation (FDIC). As part of GAO's 2002 financial statement audits of the three FDIC funds, we assessed (1) the corporation's progress in addressing computer security weakne...
High-Risk Series: Protecting Information Systems Supporting the Federal Government and the Nation's Critical Infrastructures
GAO-03-121: Published: Jan 1, 2003. Publicly Released: Jan 1, 2003.
Since GAO designated computer security in the federal government as high risk in 1997, evidence of pervasive weaknesses has been continuing. Also, related risks have been escalating, in part because of the dramatic increases in computer interconnectivity and increasing dependence on computers to support critical operations and infrastructures, such as power distribution, water supply, national def...