Problem Statement
List the key steps involved in containing an incident.
Explanation
Containment typically includes:
1. Identifying affected assets.
2. Disconnecting or isolating compromised systems.
3. Blocking malicious IPs or domains.
4. Applying temporary patches or access restrictions.
5. Preserving evidence for investigation.
Each step minimizes spread while maintaining data integrity for future analysis.