Detect, identify, analyze, and respond, to cybersecurity incidents in an organization's systems or network. It involves incident response plans such as intrusion detection systems, log analysis, and documenting detailed information about potential incidents.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)