Which of the following details should be included in documentation of an attack?
A.
An overview of the security policy and suggestions for the next response plan
B.
Estimates of how much the attack cost the company, and a list of the applications used by the
attacker
C.
The time and date of the attack, and the names of employees who were contacted during the
response
D.
The network resources involved in the attack, and recommendations for thwarting future attacks