Computer security (1 - 8 of 8 items) in Custom Date Range
Financial Market Organizations Have Taken Steps to Protect against Electronic Attacks, but Could Take Additional Actions
GAO-05-679R: Published: Jun 29, 2005. Publicly Released: Jul 29, 2005.
The September 11, 2001, terrorist attacks on the World Trade Center exposed the vulnerability of the financial markets to disruption by such events. As part of a series of reviews we have performed at the request of Members of Congress, we have examined and reported on the adequacy of the steps that financial market participants have taken to reduce their vulnerability to attacks and to be better...
Social Security Administration: Agency Must Position Itself Now to Meet Profound Challenges
GAO-02-289T: Published: May 2, 2002. Publicly Released: May 2, 2002.
The Social Security Administration (SSA) provided $450 billion in benefits to 50 million recipients in fiscal year 2001. Since 1995, when SSA became an independent agency, GAO has called for effective leadership and sustained management attention to several unresolved management challenges, including the redesign of its disability claims process, management and oversight problems with its SSI prog...
Abstracts of Reports and Testimony: Fiscal Year 2000
GAO-01-558SP: Published: Mar 1, 2001. Publicly Released: Mar 1, 2001.
The U.S. General Accounting Office (GAO) is an independent, nonpartisan agency in the legislative branch. GAO provides Congress with the best information available to help members make informed oversight, policy, and funding decisions. GAO meets Congress' information needs by (1) evaluating how government programs and policies are working, (2) auditing agency operations to determine whether federa...
Critical Infrastructure Protection: Comprehensive Strategy Can Draw on Year 2000 Experiences
AIMD-00-1: Published: Oct 1, 1999. Publicly Released: Oct 5, 1999.
Pursuant to a congressional request, GAO provided information on efforts to protect the nation's critical infrastructures, focusing on: (1) GAO's recent findings on computer security and critical infrastructure protection; and (2) preliminary lessons learned from the year 2000 date conversion experience that can benefit critical infrastructure protection efforts.GAO noted that: (1) the nation's co...
The Treasury Financial Communications System
129307: Mar 11, 1986
GAO discussed its review of internal controls over disbursements made through the Department of the Treasury Financial Communications System (TFCS), through which Treasury generally makes large, nonrecurring payments such as letter-of-credit payments to grant recipients and large payments to vendors. GAO determined that: (1) because of a breakdown in system access controls, it was possible for una...
Planning for the Security of Local Area Networks
129557: Jan 1, 1986
This article provides a plan for private and public organizations to secure local area network data and a context for developing and evaluating an organization's security requirements in its operating environment...
Telecommunications Security and Privacy
122613: Oct 17, 1983
Testimony was given concerning computer and telecommunications security vulnerabilities in Federal departments and agencies. GAO stated that the potential for data loss is increasing because more information is maintained in automated systems. The importance of the necessity for all Government agencies to contribute to achieving security was emphasized. A comprehensive policy is needed; however, G...
Federal Information Systems Remain Highly Vulnerable to Fraudulent, Wasteful, Abusive, and Illegal Practices
MASAD-82-18: Published: Apr 21, 1982. Publicly Released: May 19, 1982.
GAO was requested to evaluate the information security programs in the executive agencies. Specifically, GAO was asked to address: (1) whether the Office of Management and Budget (OMB) guidelines, if fully implemented by the executive agencies, provide an acceptable level of protection over information systems; (2) whether the central agencies fulfill their governmentwide information security prog...