(1. Information security laws, regulations and norms; 2. Emergency response and intrusion/intrusion inquiry; 3. System detection and reinforcement; 4. Attack plan information collection and identification; 5. Intrusion/intrusion prevention technology
_rels\.rels)