A six stage methodology can be implemented to respond to a network security
breach. These six stages are, preparation, detection, containment, eradication,
recovery, and follow up. Preparation includes a set of defenses to deal with
threats, preparing staff by providing security awareness, and creating
procedures to deal with incidents as