This is a systematic and documented method of approaching and managing situations resulting from IT security incidents or breaches.
Answer:
critical actions that are taken in the first few minutes of an emergency
Step-by-step explanation:
9.5m questions
12.2m answers