3.4. Eradication
3. Incident Response Phases
3.4. Eradication
3.4.1. Eradicate the incident. Identify and mitigate all vulnerabilities that
3.1. Preparation
3.2. Detection and Analysis
3.3. Containment
3.5. Recovery
3.6. Post-Incident Activity
By
Efrain Ortiz