Problem
There is no such thing as a secure information technology system. Many information systems have designed flaws or vulnerabilities that a threat actor can exploit. Therefore, organizations need to have an incident response policy. Review the NIST computer security incident handling guide and discuss the different phases of the incident response process, as well as the tools and technology used by the incident response team during the different phases.