1. Introduction 2. Considerations to Apply TechnicalSecurity Controls 2.1 Cyber Security Control Assessme 2.2 Alternative Controls 2.3 Periodic Monitoring and Review 2.4 Role based Access Control 3. Conclusions REFERENCES
저자
Chaechang Lee(Korea Institute of Nuclear Nonproliferation and Control)