A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?
- Security operations
- Security and risk management
- Asset security
- Identity and access management