The Dept. of the Treasury relies heavily on information systems -- a on the publicAis trust in its work. Information security is therefore critical to Treasury operations. In support of its annual audit of the govt.Ais financial statements, the author assessed the effectiveness of: (1) TreasuryAis information security controls in protecting the confidentiality, integrity, a availability of the departmentAis systems a data; a (2) TreasuryAis implementation of its departmentwide information security program. In assessing the adequacy of TreasuryAis information security program, the author focused on the effectiveness of its departmentwide policies a processes, rather than on bureau-specific directives a guidance. Includes recommendations. Charts a tables.At Treasury, the vast majority of the departmenta#39;s information system assets and computing operations are located at the ... For example, the manual was silent in many areas where security policy was needed, such as voice mail, e-mail, andanbsp;...
|Author||:||Robert F. Dacey|
|Publisher||:||DIANE Publishing - 2008-05|