Last Updated on August 7, 2021 by Admin 1
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
- Cyber Incident Response Plan
- Crisis Communication Plan
- Occupant Emergency Plan
- Disaster Recovery Plan