Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

Last Updated on August 7, 2021 by Admin

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

  • Cyber Incident Response Plan
  • Crisis Communication Plan
  • Occupant Emergency Plan
  • Disaster Recovery Plan