This is a systematic and documented method of approaching and managing situations resulting from IT security incidents or breaches.
Answer:
critical actions that are taken in the first few minutes of an emergency
Step-by-step explanation:
7.2m questions
9.6m answers