Hidden fields
Libros Libros
" ... vA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual or suspicious access activities. In addition, the department was not providing adequate physical security for its computer... "
Waste, Fraud, and Abuse at the Defense Department, Veterans Affairs, and ... - Página 35
por United States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Veterans Affairs, and International Relations - 1999 - 129 páginas
Vista completa - Acerca de este libro

Information Security: Hearing Before the Committee on Governmental Affairs ...

United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 204 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to vA systems. vA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual...
Vista completa - Acerca de este libro

Information Systems: VA Computer Control Weaknesses Increase Risk of Fraud ...

United States. General Accounting Office - 1998 - 48 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual...
Vista completa - Acerca de este libro

Information Security: Hearing Before the Committee on Governmental Affairs ...

United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 256 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...internal and external, from gaining unauthorized access lo VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for...
Vista completa - Acerca de este libro

Information Security: Serious Weaknesses Place Critical Federal Operations ...

Jean H. Boltz - 1999 - 99 páginas
...authorized users or effectively manage user identifications and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual...
Vista completa - Acerca de este libro

Major Management Challenges and Program Risks: Department of Veterans Affairs

United States. General Accounting Office - 1999 - 60 páginas
...Significant challenges also exist in VA'S control and oversight of access to computer systems. For example, VA has not established effective controls to prevent...attention to unusual or suspicious access activities. In addition, VA is not providing adequate physical security for its computer facilities, assigning...
Vista completa - Acerca de este libro

Information Security: Congressional Hearing

Fred Thompson - 2000 - 203 páginas
...authorized users or effectively manage user identifications (ID) and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual...
Vista completa - Acerca de este libro

Information security serious weaknesses place critical federal operations ...

77 páginas
...authorized users or effectively manage user identifications and passwords. The department also had not established effective controls to prevent individuals,...access to VA systems. VA'S access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual...
Vista completa - Acerca de este libro




  1. Mi biblioteca
  2. Ayuda
  3. Búsqueda avanzada de libros
  4. Descargar EPUB
  5. Descargar PDF