Identification
The process of recognizing and assessing potential security risks, vulnerabilities, and threats to the system or network.
Prevention
Implementing measures such as firewalls, encryption, and access controls to stop cyber threats before they can exploit vulnerabilities.
Detection
Monitoring systems for suspicious activities or breaches, using tools like intrusion detection systems (IDS) to catch attacks in real time.
Response
Taking immediate action to contain, mitigate, and recover from cyber incidents, minimizing damage and restoring system integrity.