Application Technological Solutions Essay

Total Length: 638 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

IRS

Technological Solutions

Improvements in technology for a public organization: The IRS

The IRS is a public agency that affects virtually every American's life. Even Americans who do not owe taxes must submit forms to the IRS, detailing their economic status. The IRS contains a wealth of information that would be of interest to someone attempting to impinge upon the security of the organization, including Social Security and financial data. To ensure people's identities are not compromised and that all financial data is stored in an accurate fashion, the IRS's Computer Security Incident Response Center (CSIRC) has the responsibility of "preventing, detecting, reporting, and responding to computer security incidents targeting IRS computers and data" (Nevius 2012).

However, there are serious problems with the CSIRC. Firstly, a recent audit of the CSIRC's found that its "host-based intrusion detection system is not monitoring 34% of IRS servers, which puts the IRS network and data at risk" for a fairly considerable percentage of citizens (Nevius 2012).
"In addition, the CSIRC is not reporting all computer security incidents to the Treasury Department, as required. During the period audited, TIGTA found 84 computer security incidents that were not reported to Treasury, including five incidents involving sabotage or intrusion" (Nevius 2012). The reason for this is that there is no clear chain of command or bureaucratic method in place at the IRS regarding incident response policies and to whom they should be reported. Such "plans, and procedures are either nonexistent or are inaccurate and incomplete" (Nevius 2012).

The IRS must improve the scope of its server monitoring, to ensure that all servers are monitored to ensure that there are no security breaches. This would require the IRS to "develop its cybersecurity data warehouse capability to correlate and reconcile active servers connected to the IRS network with servers monitored by the host-based intrusion detection system" (Nevius 2012). Standard operating procedures must also be put into place….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Application Technological Solutions" (2012, September 11) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/application-technological-solutions-109040

Latest MLA Format (8th edition)

Copy Reference
"Application Technological Solutions" 11 September 2012. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/application-technological-solutions-109040>

Latest Chicago Format (16th edition)

Copy Reference
"Application Technological Solutions", 11 September 2012, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/application-technological-solutions-109040