overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.