2. Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario.
a. Step 1 – Preparation: What steps would you take to prepare for this type of incident?
b. Step 2 – Detection and Analysis: Steps you would need to take in order to detect a potential DDoS incident and confirm if the incident is accurate
c. Step 3 – Containment Eradication and Recovery: What actions do you need to take to contain and recover from a DDoS incident
d. Step 4 – Post-Incident Activity – Describe the steps you would take post incident