Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls
A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls