... vA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual or suspicious access activities. In addition, the department was not providing adequate physical security for its computer... Waste, Fraud, and Abuse at the Defense Department, Veterans Affairs, and ... - Página 35por United States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Veterans Affairs, and International Relations - 1999 - 129 páginasVista completa - Acerca de este libro
| United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 204 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to vA systems. vA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual... | |
| United States. General Accounting Office - 1998 - 48 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual... | |
| United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 256 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...internal and external, from gaining unauthorized access lo VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for... | |
| Jean H. Boltz - 1999 - 99 páginas
...authorized users or effectively manage user identifications and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual... | |
| United States. General Accounting Office - 1999 - 60 páginas
...Significant challenges also exist in VA'S control and oversight of access to computer systems. For example, VA has not established effective controls to prevent...attention to unusual or suspicious access activities. In addition, VA is not providing adequate physical security for its computer facilities, assigning... | |
| Fred Thompson - 2000 - 203 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual... | |
| 77 páginas
...authorized users or effectively manage user identifications and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual... | |
| |