each customer separately from the account of its own, in accordance with the rules specified in the notification of the SEC. In cases where the derivatives business operator has advanced its own asset to
, conflagration, storm or epidemics. 9.5 Human-caused disaster, such as, terrorist, being caught as hostage or cyber attack. BCI Good practice guidelines http://www.thebci.org/ High-level principles for business
encryption of information transmitted through computer network system, the prevention of distributed denial of service (DDoS) attack, the intrusion from malware, the protection against threats advanced
โจมตีในลักษณะ DDoS (distributed denial of service) การป้องกันการบุกรุกจากโปรแกรมไม่ประสงค์ดี การป้องกันภัยคุกคามในรูปแบบใหม่ (advanced persistent threat) การแบ่งแยกเครือข่าย การเข้ารหัสระหว่างแอพพลิเคชั่น
opinion of an independent specialist on the technology used in the infrastructure business (technological feasibility) if that technology has never been adopted in Thailand or is an advanced technology that