Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]
Abstract
The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated March 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.
- Publication Date:
- Research Org.:
- USDOE Assistant Secretary for Management and Administration, Washington, DC
- OSTI Identifier:
- 5152701
- Report Number(s):
- DOE/MA-0071
ON: DE82016635
- Resource Type:
- Technical Report
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; 29 ENERGY PLANNING, POLICY AND ECONOMY; US DOE; COST; MANAGEMENT; CONTROL; THEFT; VULNERABILITY; NATIONAL ORGANIZATIONS; US ORGANIZATIONS; 990100* - Management; 293000 - Energy Planning & Policy- Policy, Legislation, & Regulation
Citation Formats
. Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]. United States: N. p., 1982.
Web.
. Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]. United States.
. 1982.
"Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]". United States.
@article{osti_5152701,
title = {Guidelines for conducting vulnerability assessments. [Susceptibility of programs to unauthorized use of resources]},
author = {},
abstractNote = {The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated March 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.},
doi = {},
url = {https://www.osti.gov/biblio/5152701},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Jun 01 00:00:00 EDT 1982},
month = {Tue Jun 01 00:00:00 EDT 1982}
}