Term
Definition
Identify
Protect
Detect
Respond
Recover
Govern
Drop Here
Drop Here
Drop Here
Drop Here
Drop Here
Drop Here
Use network based IDPS
Manage communication during an incident
Restore systems and assets affected by an incident
Determine how laptops connect to the network
Write the Information Security Policy
Proactively secure the settings on a device