Encryption solution on the i. R. S. Side. We are working with the department of ed. Mr. Hurd how will it help with authentication if you have a user that has stolen credentials . Ms. Garza the solution that we had looked at was not satisfactory to provide the useability of the application so we have moved to an encryption so unless that mr. Hurd that doesnt answer the question. The question is, how does encryption on the back end help with authentication of an attacker that is using stolen credentials . Ms. Garza it does not improve authentication. What it does do is not allow the data to be revealed to someone other than the actual applicant. Mr. Hurd but if you have stolen credentials and youre not able then youre able to spoof that you have the credentials, what are you doing to prevent that from happening . Ms. Garza so there are a set of keys that on the i. R. S. Thats only shared with the department of education. So as the applicant comes in and releases tells us to release the d
The key word is trying to come up with a solution is not sure we have arrived at that. After the october 2016 discovery that the dit could be vulnerable the irs is monitoring for any suspicious activity, we engaged with our friends. And asked them, and suspicious activity in january. And an incident in february, multilayer Defense Mechanisms, one of the mechanisms is notification to the address record for the individual. That led us to identify the we had an issue, we were able to find that in fact there is fraud that has taken place and immediately shut down the application. It is not discovered by accident. It was a notice generated from the taxpayer. The taxpayer came in and notified us. Taking responsibly for the irs, and the applications face. Please her young peoples lives at stake, to fit their unraveling that. The gentleman yields back. The chair would like to recognize the gentlelady from new jersey for five minutes. Good morning to all of you. In september the Inspector Gener
The key word is trying to come up with a solution is not sure we have arrived at that. After the october 2016 discovery that the dit could be vulnerable the irs is monitoring for any suspicious activity, we engaged with our friends. And asked them, and suspicious activity in january. And an incident in february, multilayer Defense Mechanisms, one of the mechanisms is notification to the address record for the individual. That led us to identify the we had an issue, we were able to find that in fact there is fraud that has taken place and immediately shut down the application. It is not discovered by accident. It was a notice generated from the taxpayer. The taxpayer came in and notified us. Taking responsibly for the irs, and the applications face. Please her young peoples lives at stake, to fit their unraveling that. The gentleman yields back. The chair would like to recognize the gentlelady from new jersey for five minutes. Good morning to all of you. In september the Inspector Gener
The chef report for federal student aid was mung those who took questions from the House Oversight economy. This is about 2 1 2 hours. Good morning. The economy on oversight and government reform will come to order. Without objection the chair is authorized to declare a recess at any time. The chair notes the presence of our colleague, congressman bobby scott from virginia. We appreciate his interest in this topic and welcome your participation today sir. I asked consent that congressman scot scott be allowed to participate in todays hearing. Without objection it will be so ordered. I would also like to ask yew mannous consent to enter into the records statements from the following social works. The National Association of student aid administrates. The National College network. The National Role on education and epic. Today we are here to talk about a data breach involving a department of education website and an irs webbased application. Every day literally, every series criminal con
The chef report for federal student aid was mung those who took questions from the House Oversight economy. This is about 2 1 2 hours. Good morning. The economy on oversight and government reform will come to order. Without objection the chair is authorized to declare a recess at any time. The chair notes the presence of our colleague, congressman bobby scott from virginia. We appreciate his interest in this topic and welcome your participation today sir. I asked consent that congressman scot scott be allowed to participate in todays hearing. Without objection it will be so ordered. I would also like to ask yew mannous consent to enter into the records statements from the following social works. The National Association of student aid administrates. The National College network. The National Role on education and epic. Today we are here to talk about a data breach involving a department of education website and an irs webbased application. Every day literally, every series criminal con