Question: If you suspect an IT security incident, you should take immediate action to isolate the problem from the organization’s network. In this discussion, you will speak to the components of an incident reporting policy. Use this topic to create a step-by-step policy that employees will follow in the event that they need to report an incident on the network. Remember your audience as you write your policy; keep it easy to understand and simple to follow. Your process should describe the reporting step action items in a prioritized sequence. Conclude your post with a rationale summarizing how you developed the order of your steps and how can ensure others will be able to follow it and preserve network security.

Answer: The policy outlines the steps that employees should follow in the event of a security concern…….