preparation
|
containment, eradication, and recovery
|
post-incident analysis
|
detection and analysis
|
|
create communication guidelines for effective incident handling
|
preparation
|
gather indicators of compromise and restore the system
|
containment, eradication, and recovery
|
document information to mitigate similar occurrences
|
post-incident analysis
|
collect data from systems for further investigation
|
detection and analysis
|
|