TITLE

Opportunities Exist for the Federal Housing Finance Agency to Improve Controls

AUTHOR(S)
Wilshusen, Gregory C.; Barkakati, Nabajyoti
PUB. DATE
April 2010
SOURCE
GAO Reports;4/30/2010, preceding p1
SOURCE TYPE
Government Documents
DOC. TYPE
Article
ABSTRACT
The Federal Housing Finance Agency (FHFA) relies extensively on computerized systems to carry out its mission to provide effective supervision, regulation, and housing mission oversight of the Federal National Mortgage Association (Fannie Mae), the Federal Home Loan Mortgage Corporation (Freddie Mac), and the federal home loan banks. Effective information security controls are essential to ensure that FHFA's financial information is protected from inadvertent or deliberate misuse, disclosure, or destruction. As part of its audit of FHFA's fiscal year 2009 financial statements, GAO assessed the effectiveness of the agency's information security controls to ensure the confidentiality, integrity, and availability of the agency's financial information. To do this, GAO examined FHFA information security policies, procedures, and other documents; tested controls over key financial applications; and interviewed key agency officials.
ACCESSION #
50800159

 

Related Articles

  • Why Your Facility Needs a Visitor Management System. Downing, Cindy // Buildings;Jan2006, Vol. 100 Issue 1, p32 

    This article focuses on the significance of a visitor management system. Workplace violence, industrial espionage, and terrorism threaten personnel and property security. When facility entrances are not secure, companies are vulnerable and liable. A visitor management system with software tools,...

  • IP Surveillance: the Reliability Factor. Elliott, David // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p50 

    The article discusses the reliability issues of the Internet Protocol (IP)-based video surveillance system. It explores the difference between an analog video surveillance system and the IP-based technology, and examines their respective advantages and disadvantages. However, it points out that...

  • Great Security.  // Security: Solutions for Enterprise Security Leaders;Apr2005, Vol. 42 Issue 4, p18 

    Looks into the integrated facility management system implemented by the government of the state of Michigan. Installation of security and technology solutions; Optimization of operational efficiencies with integrated systems; Establishment of advanced technologies for the state's overall...

  • Northwest Electronic Security Has the Latest in Biometric Systems.  // Caribbean Business;10/27/2005, Vol. 33 Issue 42, pS10 

    Focuses on ACTAtek, the world's only biometric and smart card authentication system using encrypted and secure Web-based, real time communication, by Northwestern Electronic Security. Benefits of the biometric system; Functions of the system; Impact of the system on the security management industry.

  • STEP 2- GAP ANALYSIS.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p29 

    The article discusses the second step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security measures. The goal of this phase is to identify the gaps between the model facility and the current situation. It...

  • STEP 3 - GAP CLOSURE.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p71 

    The article discusses the third step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. This phase prompt to mitigate the various risks identified in the second step through consideration and evaluation...

  • STEP 4 - SECURITY STRATEGIC PLAN.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p169 

    The article discusses the fourth step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. The section focuses on how to set out strategic plan appropriate to get management approval and develop a blue...

  • Not Your Average Printer Accessories.  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p28 

    Highlights the latest technology in identification cards as of September 2005. Cards implanted with a tamper-resistant hologram within the layers of plastic cards; Pre-printed text on ID cards; Opacity marked cards; Pre-printed serial numbers.

  • DoorKing, Inc.  // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p56 

    The article features the corporate profile of DoorKing, Inc. in Inglewood, California. It mentions that the company is considered as the prime producer of innovative security-related products provided for the access control industry in the U.S. It highlights the products that are usually...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics