The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

Fill in the blank(s) with the appropriate word(s).

Detection and recovery

Computer Science & Information Technology

You might also like to view...

Select recommended usability and accessibility practices:

a. use video and sound whenever possible b. supply text descriptions of audio and video files that appear in your web pages c. never use audio and video files d. none of the above

Computer Science & Information Technology

What is a database lockout?

What will be an ideal response?

Computer Science & Information Technology