Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Corrective controls
Detective controls
Safeguards
Preventive controls
Submit