Department of Taxation and Finance, Computer Security Controls Need Strengthening

Department of Taxation and Finance, Computer Security Controls Need Strengthening PDF Author: New York (State). Department of Audit and Control
Publisher:
ISBN:
Category : Electronic data processing departments
Languages : en
Pages :

Get Book Here

Book Description


Information Security

Information Security PDF Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781976359873
Category :
Languages : en
Pages : 34

Get Book Here

Book Description
The Internal Revenue Service (IRS) has a demanding responsibility in collecting taxes, processing tax returns, and enforcing the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations. Effective information security controls are essential for ensuring that information is adequately protected from inadvertent or deliberate misuse, disruption, or destruction. As part of its audit of IRS's fiscal year 2005 financial statements, GAO assessed (1) the status of IRS's actions to correct or mitigate previously reported information security weaknesses at two sites and (2) whether controls over key financial and tax processing systems located at the facilities are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer data.

Information Security

Information Security PDF Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781977960306
Category :
Languages : en
Pages : 30

Get Book Here

Book Description
The IRS has a demanding responsibility in collecting taxes, processing tax returns, and enforcing the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the financial and sensitive taxpayer data that resides on those systems. As part of its audit of IRS's fiscal year 2014 and 2013 financial statements, GAO assessed whether controls over key financial and tax-processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, GAO examined IRS information security policies, plans and procedures; interviewed key agency officials; and tested controls over key financial applications at four sites.

Information Security

Information Security PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 9781422314654
Category :
Languages : en
Pages : 26

Get Book Here

Book Description
In carrying out its mission to ensure that securities markets are fair, orderly, & efficiently maintained, the Securities & Exchange Comm. (SEC) relies extensively on computerized systems. Integrating effective information security controls into a layered control strategy is essential to ensure that SEC¿s financial & sensitive information is protected from inadvertent or deliberate misuse, disclosure, or destruction. This report assessed: (1) SEC¿s actions to correct previously reported information security weaknesses; & (2) the effectiveness of controls for ensuring the confidentiality, integrity, & availability of SEC¿s information systems & information. Includes recommendations. Charts & tables.

Financial Markets

Financial Markets PDF Author: United States Accounting Office (GAO)
Publisher: Createspace Independent Publishing Platform
ISBN: 9781720311508
Category :
Languages : en
Pages : 34

Get Book Here

Book Description
Financial Markets: Computer Security Controls at Five Stock Exchanges Need Strengthening

Financial Markets

Financial Markets PDF Author: United States. General Accounting Office
Publisher:
ISBN:
Category : Computer crimes
Languages : en
Pages : 15

Get Book Here

Book Description


Information Security

Information Security PDF Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781976401305
Category :
Languages : en
Pages : 26

Get Book Here

Book Description
In carrying out its mission to ensure that securities markets are fair, orderly, and efficiently maintained, the Securities and Exchange Commission (SEC) relies extensively on computerized systems. Integrating effective information security controls into a layered control strategy is essential to ensure that SEC's financial and sensitive information is protected from inadvertent or deliberate misuse, disclosure, or destruction. As part of its audit of SEC's financial statements, GAO assessed (1) SEC's actions to correct previously reported information security weaknesses and (2) the effectiveness of controls for ensuring the confidentiality, integrity, and availability of SEC's information systems and information. To do this, GAO examined security policies and artifacts, interviewed pertinent officials, and conducted tests and observations of controls in operation.

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity PDF Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 48

Get Book Here

Book Description
The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.

Powering the Digital Economy: Opportunities and Risks of Artificial Intelligence in Finance

Powering the Digital Economy: Opportunities and Risks of Artificial Intelligence in Finance PDF Author: El Bachir Boukherouaa
Publisher: International Monetary Fund
ISBN: 1589063953
Category : Business & Economics
Languages : en
Pages : 35

Get Book Here

Book Description
This paper discusses the impact of the rapid adoption of artificial intelligence (AI) and machine learning (ML) in the financial sector. It highlights the benefits these technologies bring in terms of financial deepening and efficiency, while raising concerns about its potential in widening the digital divide between advanced and developing economies. The paper advances the discussion on the impact of this technology by distilling and categorizing the unique risks that it could pose to the integrity and stability of the financial system, policy challenges, and potential regulatory approaches. The evolving nature of this technology and its application in finance means that the full extent of its strengths and weaknesses is yet to be fully understood. Given the risk of unexpected pitfalls, countries will need to strengthen prudential oversight.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information PDF Author: Erika McCallister
Publisher: DIANE Publishing
ISBN: 1437934889
Category : Computers
Languages : en
Pages : 59

Get Book Here

Book Description
The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.