The reactive security measures are different from that of the proactive security measures; this is because the
reactive measures are deployed after or during an attack. From Figure 9, the reactive security measures system is
responsible for; security incident, post-mortem analysis, recovery measure, taking steps to prevent same attack
from happening again