A company experienced a data breach in which an attacker gained access to sensitive customer information, including names, addresses, and credit card numbers. Which of the following best describes the importance of identifying the impact of this security incident?
a. To determine the attacker's identity unselected
b. To identify the exploited vulnerability unselected
c. To determine the attack vector used by the attacker unselected
d. To assess the potential harm to customers