Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A.
Safeguards
B.
Preventive controls
C.
Detective controls
D.
Corrective controls
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A.
Safeguards
B.
Preventive controls
C.
Detective controls
D.
Corrective controls