4. Explain why it is important to maintain an up to date cyber security incident log (AC 2.1)
Previous3. Describe the stages of a cyber security incident response lifecycle (AC 1.3)Next5. Explain the steps to be included within a cyber security incident response plan (AC 2.2)
Last updated