Questions? Call 800-624-6242
add to cart
Rights & Permissions
. "4 What Can Be Done Now?." Information Technology for Counterterrorism: Immediate Actions and Future Possibilities. Washington, DC: The National Academies Press, 2003.
Please select a format:
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Mandatory reporting of security breaches that could threaten critical societal functions;10
Changing accounting procedures to require sanitized summaries of information-security problems and vulnerabilities to be made public in shareholder reports; and
Encouraging insurance companies to grant preferential rates to companies whose IT operations are regarded as meeting certain security standards of practice.
Note, however, that there are disadvantages as well as advantages to any of these specific options, and a net assessment of their ultimate desir-ability remains to be undertaken.