Introduction
When a computer system is attacked or infected by malware, simply detecting the problem is not enough. The system needs to be cleaned and restored to normal operation to prevent further damage and loss.
Imagine a house that has been broken into and damaged. Eradication is like removing the burglars and fixing broken locks. Recovery is cleaning up the mess and replacing stolen items. Verification is checking that all doors and windows are secure. Documentation is writing down what happened to improve home security.
┌─────────────┐
│ Detection │
└─────┬───────┘
│
┌─────▼───────┐
│ Eradication │
└─────┬───────┘
│
┌─────▼───────┐
│ Recovery │
└─────┬───────┘
│
┌─────▼─────────────┐
│ Verification & │
│ Testing │
└─────┬─────────────┘
│
┌─────▼─────────────┐
│ Documentation & │
│ Lessons Learned │
└───────────────────┘