11.6 Mobilizing organization resources for priority V

 < Day Day Up > 



Action Checklist Number 11 (see Table 11.1) shows which steps IT managers in all types of organizations can take to synchronize their efforts with those of the government to develop greater national security and international cyberspace-security cooperation. The next chapter focuses on the future of homeland security.

Table 11.1: Action Checklist Number 11

Action Item

Status (e.g., Completed, Pending, or N/A)

Determine if computers or networks that are owned or operated by the organization located in other countries are or have been under attack.

 

If computers or networks that are owned or operated by the organization located in other countries are or have been under attack, develop a reporting mechanism to alert authorities in the United States of these occurrences.

 

Develop a policy and procedure, to assist in attack attribution and response and modify the computer-incident response plan accordingly.

 

Determine if the organization has operations in any country that is a signatory of the CoE Convention on Cybercrime and analyze how that may impact IT policies, procedures, and operations.

 

Devise plans to influence countries in which the organization has operations and that are not signatories of the CoE Convention on Cybercrime to become signatories.

 



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net