Skip to main content

Information Security: Further Efforts Needed to Fully Implement Statutory Requirements in DOD

GAO-03-1037T Published: Jul 24, 2003. Publicly Released: Jul 24, 2003.
Jump To:
Skip to Highlights

Highlights

The Department of Defense (DOD) faces many risks in its use of globally networked computer systems to perform operational missions--such as identifying and tracking enemy targets--and daily management functions--such as paying soldiers and managing supplies. Weaknesses in these systems, if present, could give hackers and other unauthorized users the opportunity to modify, steal, inappropriately disclose, and destroy sensitive military data. GAO was asked, among other things, to discuss DOD's efforts to protect its information systems and networks from cyber attack, focusing on its reported progress in implementing statutory information security requirements.

Full Report

GAO Contacts

Office of Public Affairs

Topics

Computer crimesComputer security policiesComputer networksComputer securityHackersInformation securityInformation systemsInternal controlsSecurity policiesTrojan horses