Citation Hunt

The Wikipedia snippet below is not backed by a reliable source. Can you find one?

Click I got this! to go to Wikipedia and fix the snippet, or Next! to see another one. Good luck!

In page Information security:

"

This part of the incident response plan identifies if there was a security event.[1] When an end user reports information or an admin notices irregularities, an investigation is launched. An incident log is a crucial part of this step.[citation needed] All of the members of the team should be updating this log to ensure that information flows as fast as possible.[2] If it has been identified that a security breach has occurred the next step should be activated.[3]