3.3. Containment
3. Incident Response Phases
3.3. Containment
3.3.1. Contain the incident—halt the DoS if it has not
3.1. Preparation
3.2. Detection and Analysis
3.4. Eradication
3.5. Recovery
3.6. Post-Incident Activity
By
Efrain Ortiz