http://172.19.1.196:8983/solr/secweb/select?q=Fascinating intelligence OR "Fascinating intelligence" OR "Interesting intellect" OR "Interesting mind" OR "Captivating intellect" OR "Captivating mind"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field=key_sitemap&facet.field=system_name&facet.field=key_keywords&hl=on&hl.fragsize=200&hl.fl=id,title_th,searchcontent_th&defType=edismax&qf=searchcontent_th&qf=id&qf=title_th^1000000&pf=title_th~5^1&pf=searchcontent_th~5^10000&ps=2&mm=100&qf=title_th_default&fq=key_filetype%3Adoc&start=0&rows=10
software or changes should be investigated; (5) procedures to monitor and verify threat intelligence to make all relevant users become aware of threats.
8.3 Backup
Objective: To protect against loss of data