Methods for cyber-physical security management for telecom CI- final

Summary
Inventory including compliance with standards, rigor, effectiveness and efficiency - Tabular Report and database