Verified Document

Application Technological Solutions Essay

IRS Technological Solutions

Improvements in technology for a public organization: The IRS

The IRS is a public agency that affects virtually every American's life. Even Americans who do not owe taxes must submit forms to the IRS, detailing their economic status. The IRS contains a wealth of information that would be of interest to someone attempting to impinge upon the security of the organization, including Social Security and financial data. To ensure people's identities are not compromised and that all financial data is stored in an accurate fashion, the IRS's Computer Security Incident Response Center (CSIRC) has the responsibility of "preventing, detecting, reporting, and responding to computer security incidents targeting IRS computers and data" (Nevius 2012).

However, there are serious problems with the CSIRC. Firstly, a recent audit of the CSIRC's found that its "host-based intrusion detection system is not monitoring 34% of IRS servers, which puts the IRS network and data at risk" for a fairly considerable percentage of citizens...

"In addition, the CSIRC is not reporting all computer security incidents to the Treasury Department, as required. During the period audited, TIGTA found 84 computer security incidents that were not reported to Treasury, including five incidents involving sabotage or intrusion" (Nevius 2012). The reason for this is that there is no clear chain of command or bureaucratic method in place at the IRS regarding incident response policies and to whom they should be reported. Such "plans, and procedures are either nonexistent or are inaccurate and incomplete" (Nevius 2012).
The IRS must improve the scope of its server monitoring, to ensure that all servers are monitored to ensure that there are no security breaches. This would require the IRS to "develop its cybersecurity data warehouse capability to correlate and reconcile active servers connected to the IRS network with servers monitored by the host-based intrusion detection system" (Nevius 2012). Standard operating procedures must also be put into place for reporting potential breaches. This…

Sources used in this document:
References

Lockheed Martin wins two contracts to help modernize IRS technology. (2007). Red Orbit.

Retrieved: http://www.redorbit.com/news/technology/1118438/lockheed_martin_wins_two_contracts_to_help_modernize_irs_technology/

Nevius, Alistair. (2012).TIGTA recommends improvements to IRS cybersecurity system.

Journal of Accountancy. Retrieved:
http://www.journalofaccountancy.com/Web/20125436.htm
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now