1.2 Explain when a cyber security incident response plan is used