We respond to incidents, identify the cause
of the incident, contain the incident, eradicate
the threat, and restore the affected system or network.