Audrey Tang

For example, when there’s a incident reported by cyber security researchers, for example, iRent and many other private sector that’s not part of the Cyber Security Management Act, the NICS is activated by receiving these reports from say, TWCC and other CERT emergency response teams.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech