persistent threat (APT), the network segregation, the application-to-application encryption, defense-in-depth and the network hardening; (4) define a clear set of controls including access control, monitoring
reports have been finalized? If yes, Please describe the policies and procedures. 14 Has the firm established policies and procedures designed to maintain the confidentiality, safe custody, integrity
custodian: (a) System for separating the private fund assets from the custodian’s assets, system for safe keeping of such assets, and internal control system to prevent the misuse of its client’s assets; (b
keeping the password in the safe etc. and restriction for the necessary case only · Specifying the compliance period and instantly when that period had lapse. · Change the password strictly in case of the
private fund assets; □ (3) Operation system that allows the custodian to operate efficiently shall include at least the following: □ (3.1) System to separate client’s assets from custodian’s assets, safe
Translation (Unofficial Translation) PAGE (Unofficial Translation) Page 32 of 32 Readers should be aware that only the original Thai text has legal force and that this English translation is strictly for reference. The SEC, Thailand cannot undertake any responsibility for its accuracy, nor be held liable for any loss or damages arising from or related to its use. ---------------------- Notification of the Office of the Securities and Exchange Commission No. OrKhor./Nor. 5/2549 Re: Guidelines Rel...
โจมตีในลักษณะ DDoS (distributed denial of service) การป้องกันการบุกรุกจากโปรแกรมไม่ประสงค์ดี การป้องกันภัยคุกคามในรูปแบบใหม่ (advanced persistent threat) การแบ่งแยกเครือข่าย การเข้ารหัสระหว่างแอพพลิเคชั่น