Federal Family Education Loan Information System: Weak Computer Controls Increase Risk of Unauthorized Access to Sensitive Data : Report to the Secretary of Education

Front Cover
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Common terms and phrases

Popular passages

Page 4 - ... centers in Dallas and Albuquerque, we evaluated controls intended to protect data and application programs from unauthorized access; prevent the introduction of unauthorized changes to application and system software; provide segregation of duties involving application programming, system programming, computer operations, security, and quality assurance; ensure recovery of computer processing operations in case of a disaster or other unexpected interruption; and ensure that an adequate computer...
Page 5 - ... were intended to work and the extent to which center personnel considered them to be in place. We also reviewed the installation and implementation of VA'S operating system and security software. Further, we tested and observed the operation of general computer controls over VA'S information systems to determine whether they were in place, adequately designed, and operating effectively. To assist in our evaluation and testing of general computer controls, we contracted with Ernst & Young LLP....
Page 23 - Identify sensitive data files and programs and monitor successful access to them, including access by users having special access privileges.
Page 23 - s contractor to devise controls to ensure that only approved and tested changes are made to the systems software.
Page 22 - ... data needed to perform their duties, and to approve the creation of special user identifications.
Page 1 - The Honorable Richard W. Riley The Secretary of Education Dear Mr. Secretary: This report...

Bibliographic information