Response involves preparing a response program to handle
suspected intrusions and system misuse once they are detected. Institutions should have an
effective incident response program outlined in a security policy that prioritizes
incidents, discusses appropriate responses to incidents, and establishes reporting
requirements.