Energy Department Hacked Nearly 200 Times In Last Year

The department must do more to lower the risk of cyberattacks against its IT systems and networks, an internal report says.

George V. Hulme, Contributor

October 1, 2004

1 Min Read

While the U.S. Department of Energy has made strides in its efforts to bolster its IT security defenses, a report released this week by the department's Office of Inspector General concludes that much work needs to be done to effectively lower the risk of attack to the department's networks and systems

The report evaluates the state of the Energy Department's cybersecurity programs. It reveals that the department's systems were compromised 199 times in fiscal 2004 and those intrusions affected 3,531 systems. "Without continuing vigilance in this area, it is likely that future attacks will continue to jeopardize the availability and integrity of critical information technology assets," the report says.

The report highlighted three areas of weakness in the Energy Department's security program:

- The department has not completed certification and accreditation of each major system to identify and mitigate risks to those systems. - There is no prepared contingency plan to ensure mission-critical systems could continue or resume operations in the event of an emergency or disaster. - Not all of the Energy Department sites have ensured that adequate security control were in place at all times.

"Specifically, we observed continuing problems with ensuring that only authorized individuals could access information resources, duties, and responsibilities for processing financial transactions were properly segregated, and that known security vulnerabilities were corrected," the report says.

The report did note some good news. In fiscal year 2002, the Energy Department's Inspector General noted 69 cybersecurity weaknesses within the department. That number was more than halved in this year's report to 32 weaknesses.

The report, named Evaluation Report--The Department's Unclassified Cyber-Security Program-2004, can be found at http://www.ig.doe.gov/pdf/ig-0662.pdf.

Read more about:

20042004

About the Author(s)

George V. Hulme

Contributor

An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights