Reverse engineering2.Eradication techniques Sanitization Reconstruction/reimage Secure disposal3.Validation Patching Permissions Scanning Verify logging/communication to security monitoring4.Corrective actions Lessons learned report Change control process Update incident response plan5.Incident summary report Security ...