skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]

Abstract

The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated March 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.

Publication Date:
Research Org.:
USDOE Assistant Secretary for Management and Administration, Washington, DC
OSTI Identifier:
5152701
Report Number(s):
DOE/MA-0071
ON: DE82016635
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; 29 ENERGY PLANNING, POLICY AND ECONOMY; US DOE; COST; MANAGEMENT; CONTROL; THEFT; VULNERABILITY; NATIONAL ORGANIZATIONS; US ORGANIZATIONS; 990100* - Management; 293000 - Energy Planning & Policy- Policy, Legislation, & Regulation

Citation Formats

. Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]. United States: N. p., 1982. Web.
. Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]. United States.
. 1982. "Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]". United States.
@article{osti_5152701,
title = {Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]},
author = {},
abstractNote = {The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated March 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.},
doi = {},
url = {https://www.osti.gov/biblio/5152701}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Jun 01 00:00:00 EDT 1982},
month = {Tue Jun 01 00:00:00 EDT 1982}
}

Technical Report:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that may hold this item. Keep in mind that many technical reports are not cataloged in WorldCat.

Save / Share: