Responding to cybersecurity attacks involves…

References