Cyber Security Lifecycle

Cross

1. identification

2. protection

3. Detection

4. Response

5. Recovery

6.  Continuous Improvement