You work for a large organization. You notice that you have access to confidential information that
you should not be able to access in your position. You report this security incident to the helpdesk.
The incident cycle is initiated. What are the stages of the security incident cycle?

A.
Threat, Damage, Incident, Recovery
B.
Threat, Damage, Recovery, Incident
C.
Threat, Incident, Damage, Recovery
D.
Threat, Recovery, Incident, Damage
Explanation: