Cyber
Security
Lifecycle
Cross
1.
identification
Dot
Dot
Dot
2.
protection
Dot
Dot
Dot
3.
Detection
Dot
Dot
Dot
4.
Response
Dot
Dot
Dot
5.
Recovery
Dot
Dot
Dot
6.
Continuous
Improvement
Dot
Dot
Dot