| < Day Day Up > |
|
Action Checklist Number 11 (see Table 11.1) shows which steps IT managers in all types of organizations can take to synchronize their efforts with those of the government to develop greater national security and international cyberspace-security cooperation. The next chapter focuses on the future of homeland security.
Action Item | Status (e.g., Completed, Pending, or N/A) |
---|---|
Determine if computers or networks that are owned or operated by the organization located in other countries are or have been under attack. | |
If computers or networks that are owned or operated by the organization located in other countries are or have been under attack, develop a reporting mechanism to alert authorities in the United States of these occurrences. | |
Develop a policy and procedure, to assist in attack attribution and response and modify the computer-incident response plan accordingly. | |
Determine if the organization has operations in any country that is a signatory of the CoE Convention on Cybercrime and analyze how that may impact IT policies, procedures, and operations. | |
Devise plans to influence countries in which the organization has operations and that are not signatories of the CoE Convention on Cybercrime to become signatories. |
| < Day Day Up > |
|