|
Article 7
|
Each agency may conduct the correlation analysis and integration with their internal information based on the source, date of receipt, available periods, and kinds of the information, the extent of threat index, and other proper items.<br/>Each agency may conduct the cyber security sharing of the new threat that is found after the analysis and integration.
|