A computer security officer has investigated a possible data breach and has found it credible. The
officer notifies the data center manager and the Chief Information Security Officer (CISO). This is
an example of:
 
A.
 escalation and notification.
B.
 first responder.
C.
 incident identification.
D.
 incident mitigation.
 			
			
 
                