You work for a large organization. You notice that you have access to confidential information that
you should not be able to access in your position. You report this security incident to the helpdesk.
The incident cycle isinitiated. What are the stages of the security incident cycle?
A.
Threat, Damage, Incident, Recovery
B.
Threat, Damage, Recovery, Incident
C.
Threat, Incident, Damage, Recovery
D.
Threat, Recovery, Incident, Damage