to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
of passwords; (d) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and
) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
a secured log-on procedure; (c) establish password management systems to ensure security of passwords; (d) tightly restrict and control the use of utility programs and limit access to program source
; (c) establish password management systems to ensure security of passwords; (d) tightly restrict and control the use of utility programs and limit access to program source code. Additional Guidelines 1
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may