An organization has implemented a type of security control that involves restoring system functionality and repairing the damage following a cyber attack. What type of security control does this best exemplify?
Deterrent
Compensating
Detective
Preventive
Directive
Corrective