92,145 research outputs found

    Identity and Access Management System: a Web-Based Approach for an Enterprise

    Get PDF
    Managing digital identities and access control for enterprise users and applications remains one of the greatest challenges facing computing today. An attempt to address this issue led to the proposed security paradigm called Identity and Access Management (IAM) service based on IAM standards. Current approaches such as Lightweight Directory Access Protocol (LDAP), Central Authentication Service (CAS) and Security Assertion Markup Language (SAML) lack comprehensive analysis from conception to physical implementation to incorporate these solutions thereby resulting in impractical and fractured solutions. In this paper, we have implemented Identity and Access Management System (IAMSys) using the Lightweight Directory Access Protocol (LDAP) which focuses on authentication, authorization, administration of identities and audit reporting. Its primary concern is verification of the identity of the entity and granting correct level of access for resources which are protected in either the cloud environment or on-premise systems. A phased approach methodology was used in the research where it requires any enterprise or organization willing to adopt this must carry out a careful planning and demonstrated a good understanding of the technologies involved. The results of the experimental evaluation indicated that the average rating score is 72.0 % for the participants involved in this study. This implies that the idea of IAMSys is a way to mitigating security challenges associated with authentication, authorization, data protection and accountability if properly deployed

    Conducting a Self-Assessment of a Long-Term Archive for Interdisciplinary Scientific Data as a Trustworthy Digital Repository

    Get PDF
    4th International Conference on Open RepositoriesThis presentation was part of the session : Conference PresentationsDate: 2009-05-19 03:00 PM – 04:30 PMLong-term preservation and stewardship of scientific data and research-related information is paramount to the future of science and scholarship. Disciplinary and interdisciplinary scientific data archives can offer capabilities for managing and preserving data for research, education, and decision-making activities of future communities representing various scientific and scholarly disciplines. However, meeting the requirements for a trusted digital repository presents challenges to ensure that archived collections will be discoverable, accessible, and usable in the future. Assessing whether scientific data archives meet the requirements for trustworthy repositories will help to ensure that todayâ s collections of scientific data will be available in the future. A continuing self-assessment of a long-term archive for interdisciplinary scientific data is being conducted to identify improvements needed to become a trustworthy repository for managing and providing access to interdisciplinary scientific data by future communities of users. Recommendations are offered for archives of scientific data to meet the requirements of a trustworthy repository.NAS

    Audit Techniques for Service Oriented Architecture Applications

    Get PDF
    The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed.Service Oriented Architecture, Audit, Quality Attributes, Interoperability, Performance, Security

    Semi-Annual Report to Congress for the Period of April 1, 2009 to September 30, 2009

    Get PDF
    [Excerpt] I am pleased to submit this Semiannual Report to Congress, which highlights the most significant activities and accomplishments of the U.S. Department of Labor, Office of Inspector General (DOL-OIG), for the six-month period ending September 30, 2009. During this reporting period, our investigative work led to 214 indictments, 221 convictions, and 123.1millioninmonetaryaccomplishments.Inaddition,weissued22auditandotherreports.OIGauditsandinvestigationscontinuetoassesstheeffectiveness,efficiency,economy,andintegrityofDOL’sprogramsandoperations.Wealsocontinuetoinvestigatelaborracketeeringand/ororganizedcrimeinfluenceagainstunions,employeebenefitplans,andworkers.Fromanauditperspective,theOIGishighlyengagedinensuringtheintegrityofDOLactivitiesrelatedtotheAmericanRecoveryandReinvestmentActof2009(RecoveryAct)funding.Duringthisreportingperiod,weissuedfivereportstothatend.AmongourfindingsarethatDOLimplementedproceduresfortheaccountingofRecoveryActfinancialactivity,actedquicklytoimplementthepremium−assistanceprovisionsforworkerswhotemporarilymaintaintheirhealthinsuranceatgroupratesafterlosingtheirjobs,andeffectivelyimplementedthetemporaryprogramforadditionalunemploymentcompensationforeligiblerecipients.Wealsoidentifiedareasforimprovementrelatedtofinancialandperformancereportingandprogrammaticcoordinationwithstates.AnauditfoundshortcomingswithDOL’snewiCertsystem,whichisdesignedtoidentifyinaccuraciesinH−1Blaborconditionapplications(LCAs)forforeignworkers.Wefoundthat,becauseofmissingelectronicchecks,manualreviewsoftheLCAsbyanalystsarenecessary.However,increasesinthevolumeofapplicationsmayresultinanalystsnotbeingabletoperforma100percentreview.ThisincreasestheriskofLCAsbeingimproperlycertified.OurauditsalsocontinuetorevealthatsomeJobCorpscentersdonotcomplywithrequirementsforreportingperformanceforstudentattendanceandaccountability.Wealsofoundthat,atthreecenters,acontractorhadnotensuredcompliancewithprocedurestoaddressstudentmisconduct.AnauditofthehandlingofinjuredFederalemployees’reemploymentstatusattwoFederalworkers’compensationdistrictofficesfoundthattheDepartmentdidnotensurethatconsistentinterventionactionsweretakentowardremovingcasesfromtheperiodicroll.ThisincreasedtheriskofclaimantscontinuingtoreceivefullFederalEmployee’sCompensationActbenefitsaftertheywereabletoreturntoworkoraftertheircompensationcouldhavebeenreduced.Ourinvestigationscontinuetocombatorganizedcrimeand/orlaborracketeeringinvolvingthemoniesinunion−sponsoredbenefitplans,internalunioncorruption,andlabor−managementrelations.AmajorOIGinvestigationdisclosedmorethan30yearsoforganizedcrimecontroloftheInternationalLongshoremen’sAssociationLocal1235,whichrepresentsportworkersinNewJersey.Inanotherinvestigation,thebusinessmanagerfortheElectricalWorkersLocalUnionNo.3,whowasaformerNewYorkStateassemblyman,wassentencedto10years’imprisonmentonracketeering,bankfraud,andfalsestatementchargesinvolvinganumberofschemescarriedoutforpersonalgain.OIGinvestigationsalsoidentifiedvulnerabilitiesandfraudinDOLprograms,suchastheforeignlaborcertification(FLC)program.OneOIGinvestigationledtotherecentsentencingofViktarKrusandhisco−conspiratorstovariousperiodsofincarcerationforfraudulentlyobtainingvisasformorethan3,800foreignnationalsanddefraudingthegovernmentof123.1 million in monetary accomplishments. In addition, we issued 22 audit and other reports. OIG audits and investigations continue to assess the effectiveness, efficiency, economy, and integrity of DOL’s programs and operations. We also continue to investigate labor racketeering and/or organized crime influence against unions, employee benefit plans, and workers. From an audit perspective, the OIG is highly engaged in ensuring the integrity of DOL activities related to the American Recovery and Reinvestment Act of 2009 (Recovery Act) funding. During this reporting period, we issued five reports to that end. Among our findings are that DOL implemented procedures for the accounting of Recovery Act financial activity, acted quickly to implement the premium-assistance provisions for workers who temporarily maintain their health insurance at group rates after losing their jobs, and effectively implemented the temporary program for additional unemployment compensation for eligible recipients. We also identified areas for improvement related to financial and performance reporting and programmatic coordination with states. An audit found shortcomings with DOL’s new iCert system, which is designed to identify inaccuracies in H-1B labor condition applications (LCAs) for foreign workers. We found that, because of missing electronic checks, manual reviews of the LCAs by analysts are necessary. However, increases in the volume of applications may result in analysts not being able to perform a 100 percent review. This increases the risk of LCAs being improperly certified. Our audits also continue to reveal that some Job Corps centers do not comply with requirements for reporting performance for student attendance and accountability. We also found that, at three centers, a contractor had not ensured compliance with procedures to address student misconduct. An audit of the handling of injured Federal employees’ reemployment status at two Federal workers’ compensation district offices found that the Department did not ensure that consistent intervention actions were taken toward removing cases from the periodic roll. This increased the risk of claimants continuing to receive full Federal Employee’s Compensation Act benefits after they were able to return to work or after their compensation could have been reduced. Our investigations continue to combat organized crime and/or labor racketeering involving the monies in union- sponsored benefit plans, internal union corruption, and labor-management relations. A major OIG investigation disclosed more than 30 years of organized crime control of the International Longshoremen’s Association Local 1235, which represents port workers in New Jersey. In another investigation, the business manager for the Electrical Workers Local Union No. 3, who was a former New York State assemblyman, was sentenced to 10 years’ imprisonment on racketeering, bank fraud, and false statement charges involving a number of schemes carried out for personal gain. OIG investigations also identified vulnerabilities and fraud in DOL programs, such as the foreign labor certification (FLC) program. One OIG investigation led to the recent sentencing of Viktar Krus and his co-conspirators to various periods of incarceration for fraudulently obtaining visas for more than 3,800 foreign nationals and defrauding the government of 7.4 million in payroll taxes. Because of our investigative expertise, the OIG is a member of the International Organized Crime (IOC) strategy headed by the U.S. Attorney General. The IOC is committed to combating crime by international organized groups. Finally, I would like to express my sincere gratitude to former DOL Inspector General Gordon S. Heddell, who is now serving as the Inspector General at the U.S. Department of Defense. During his leadership of more than eight years, the DOL-OIG consistently achieved significant results similar to those presented in this report. As Acting Inspector General, I look forward to continuing to work with the Secretary of Labor and her management team in ensuring the effectiveness of DOL in delivering services and protecting the rights and benefits of American workers and retirees

    Information Security Audit in e-business applications

    Get PDF
    Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper–based evidence of activities. These e-business related risks should not be considered in isolation but rather as part of the overall internal control framework of an entity. It is essential to identify and assess the risks associated with an e-business environment and management should develop an e-business strategy that identifies and addresses risks. The e-business Information Systems (IS) audit is a critical component of the e-business plan. This paper tries to present a risk analysis for e-business applications in order to establish the IS audit particularities in this field.e-business, risk analysis, IS audit, confidentiality, reliability, integrity, availability
    • …
    corecore