Expert Answer: NIST incident response phases: (1) **Preparation**—incident response plan, team roles (IR lead, analysts, communications), tools (SIEM, EDR, forensics), playbooks, training; (2) **Detection & Analysis**—monitoring alerts (SIEM, IDS), log analysis, threat intelligence, triage severity, determine scope, indicators of compromise (IOCs); (3) **Containment**—short-term (isolate infected systems, block malicious IPs) and long-term (patch vulnerabilities, improve defenses), preserve evidence; (4) **Eradication**—remove malware, close backdoors, reset compromised credentials, vulnerability remediation; (5) **Recovery**—restore systems from clean backups, monitor for reinfection, gradual return to production; (6) **Post-Incident**—lessons learned meeting, update playbooks, implement improvements, compliance reporting. Timeline: document all actions with timestamps. Communication: internal stakeholders, executive updates, external (customers, regulators, law enforcement) as required.