: Identification of unauthorized access or suspicious patterns.
: Tools and methods used to preserve data integrity. 5 CF CP&SV pdf
: Classify vulnerabilities as High, Medium, or Low based on potential impact. or Low based on potential impact.