You work for a large organization. You notice that you have access to confidential
information that you should not be able to access in your position. You report this security
incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security
incident cycle?

A.
Threat, Damage, Incident, Recovery
B.
Threat, Damage, Recovery, Incident
C.
Threat, Incident, Damage, Recovery
D.
Threat, Recovery, Incident, Damage