What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and
recover from malicious computer incidents such as a denial-of-service attack?
Disaster Recovery Plan
Emergency Analysis Plan
Crisis Communication Plan
Incident Response Plan
Submit