A computer security officer has investigated a possible data breach and has found it credible. The
officer notifies the data center manager and the Chief Information Security Officer (CISO). This is
an example of:
A.
escalation and notification.
B.
first responder.
C.
incident identification.
D.
incident mitigation.