10.6 Mobilizing organization resources for priority IV

 < Day Day Up > 



Action Checklist Number 10 (see Table 10.2) shows which steps IT managers in all types of organizations can take to synchronize their efforts with those of the government to achieve the goals of securing governments' cyberspace. The next chapter focuses on developing greater national security and international cyberspace security cooperation.

Table 10.2: Action Checklist Number 10

Action Item

Status (e.g., Completed, Pending, or N/A)

Determine if the organization can or must provide direct assistance to the federal government in assessing threats and vulnerabilities.

 

If the organization can or needs to work with the federal government on assessing threats and vulnerabilities, develop a plan to accomplish that work.

 

Determine if the organization needs to address the goals and objectives regarding trusted individuals using government computer systems.

 

If the organization needs to work on a trusted individual's program, develop a plan to implement the program, including the use of agreements to safeguard information and warning banners on computer systems.

 

Determine if the organization needs to address the goals and objectives regarding wireless communications with government computer systems.

 

If the organization needs to work on securing wireless communications, develop a security plan to implement the plan.

 

Determine if the organization can or must provide direct assistance to the government in securing outsourcing or procurement operations.

 

If the organization can or needs to work with the government on securing outsourcing or procurement operations, develop a plan to accomplish that work.

 

Determine if the organization can or must provide direct or indirect assistance to the state government in assessing threats and vulnerabilities.

 

If the organization can or needs to work with the state government on assessing threats and vulnerabilities, develop a plan to accomplish that work.

 

Determine if the organization can or must provide direct or indirect assistance to the local government in assessing threats and vulnerabilities.

 

If the organization can or needs to work with the local government on assessing threats and vulnerabilities, develop a plan to accomplish that work.

 



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net