ComputerIncident Containment Strategy
A SelectSmart.com Flowchart by amy.moody
To print this page, right mouse click, open "Print preview", "Print" or a similar option depending on your browser, then use the controls to size this page appropriately. Go to SelectSmart.com/flowchart/flowchart.php?id=1000898 for the original version of this flowchart. Find and create other free decision making tools at SelectSmart.com. Use our interactive selectors to find the best college, best career, right religion, most appropriate dog breed, best college major and more.  
SelectSmart.com SelectSmart.com®
Make Your Own Flowchart
© SelectSmart.com. All Rights Reserved.


                 
Possible incident reported or suspected
Appropriate investigating team surveys suspected incident to determine validity
Valid Incident?
YES
Determine Priority, notify incident coordinator
 





NO




 
 
Process ends with notification to system owner and person reporting suspected incident
NO
Incident declared?
 







YES


 
Perform more analysis
YES
Further investigation or analysis needed?
Notify appropriate personnel, convene coordinating and investigating teams
 





NO




 
 
Incident containment
Incident eradication
Implement controls









 
 
 
 
Incident follow-up