Application Technological Solutions Essay

IRS Technological Solutions

Improvements in technology for a public organization: The IRS

The IRS is a public agency that affects virtually every American's life. Even Americans who do not owe taxes must submit forms to the IRS, detailing their economic status. The IRS contains a wealth of information that would be of interest to someone attempting to impinge upon the security of the organization, including Social Security and financial data. To ensure people's identities are not compromised and that all financial data is stored in an accurate fashion, the IRS's Computer Security Incident Response Center (CSIRC) has the responsibility of "preventing, detecting, reporting, and responding to computer security incidents targeting IRS computers and data" (Nevius 2012).

However, there are serious problems with the CSIRC. Firstly, a recent audit of the CSIRC's found that its "host-based intrusion detection system is not monitoring 34% of IRS servers, which puts the IRS network and data at risk" for a fairly considerable percentage of citizens...

...

"In addition, the CSIRC is not reporting all computer security incidents to the Treasury Department, as required. During the period audited, TIGTA found 84 computer security incidents that were not reported to Treasury, including five incidents involving sabotage or intrusion" (Nevius 2012). The reason for this is that there is no clear chain of command or bureaucratic method in place at the IRS regarding incident response policies and to whom they should be reported. Such "plans, and procedures are either nonexistent or are inaccurate and incomplete" (Nevius 2012).
The IRS must improve the scope of its server monitoring, to ensure that all servers are monitored to ensure that there are no security breaches. This would require the IRS to "develop its cybersecurity data warehouse capability to correlate and reconcile active servers connected to the IRS network with servers monitored by the host-based intrusion detection system" (Nevius 2012). Standard operating procedures must also be put into place for reporting potential breaches. This…

Sources Used in Documents:

References

Lockheed Martin wins two contracts to help modernize IRS technology. (2007). Red Orbit.

Retrieved: http://www.redorbit.com/news/technology/1118438/lockheed_martin_wins_two_contracts_to_help_modernize_irs_technology/

Nevius, Alistair. (2012).TIGTA recommends improvements to IRS cybersecurity system.

Journal of Accountancy. Retrieved:
http://www.journalofaccountancy.com/Web/20125436.htm


Cite this Document:

"Application Technological Solutions" (2012, September 11) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/application-technological-solutions-109040

"Application Technological Solutions" 11 September 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/application-technological-solutions-109040>

"Application Technological Solutions", 11 September 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/application-technological-solutions-109040

Related Documents

Technological Solutions for the NY Department of Health Instructions: Introduction The (New York) NY Department of Health is one of the public organizations under the New York government dedicating in delivering high quality healthcare for the NY residents. Before 2007, the health department used the manual method to process patents' records, which was not only prone to medical errors, the manual method was also time consuming leading to high cost of operations.

This helps the nation to be able to protect its most vital secrets, by having a system that determines how and when information is released. Identify and discuss at least three modern-day security applications that help both private and public security personnel secure locations and facilities. Three different security applications that are being currently used include: network, host and anomaly-based protocols. A network-based solution is when you are analyzing the traffic

But without the ability to identify these trends and organize the resulting information in a way so that the customer, and not the company, reaps the benefits of such prudence, a CRM solution and its vaunted technological capabilities are virtually useless. Although the particular use of technology and the relevance of its applications varies from enterprise to enterprise, one of the most valued employments of a CRM system is its

However, they remind us of the author Lall (2000), who declares that before companies or farms can use and derive the benefits of the technology, they need to learn and develop new skills. Beyond the capacity of adopting new techniques, developing countries also need the capacity to invent and adapt new technologies. Poor countries need to foster their own creativity to use both local and global knowledge and science

technological advances of today's society seem to grow as rapidly as the human population itself. Human interaction with this technology defines its culture and allows a certain way of life to flourish or diminish. In today's world, Business Intelligence (BI) represents a tool for those within economic markets. This technique combines the raw power of computers and the ability to acquire and sort events amounts of data with the

Technological and social challenges of information technology in health care Information technology has transformed all aspects of society and healthcare is no exception. One 2010 survey of physicians conducted by the Medical Group Management association found that seven of the top ten challenges identified by physicians had to do with health information technology: implementing electronic records-keeping, keeping track of Medicare reimbursement and compensation, and bi;; collections via new information management