Controls that protect the systems, networks, and environments that process, transmit, and store our
... [Show More]
data are called _______.
During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again?
Something that has the potential to cause harm to our assets is known as a(n) ________.
What is
[Show Less]