Containment is the phase of incident response focused on limiting damage, stopping spread, and reducing ongoing exposure while the incident is investigated.
Eradication is the incident-response phase focused on removing malicious presence, closing the immediate cause, and preventing the same active issue from persisting.
Recovery is the incident-response phase focused on restoring systems and operations safely after containment and eradication work is sufficiently complete.
Indicators of attack are behavioral signs that suggest malicious activity or attacker techniques are being used, even when a clear compromise artifact is not yet known.
Memory forensics is the analysis of volatile system memory to recover evidence about running processes, connections, credentials, and other activity that may not be preserved elsewhere.