Containment is the incident-response phase focused on limiting damage, slowing spread, and reducing immediate exposure while an incident is still being investigated.
Recovery is the incident-response phase focused on restoring systems and operations safely after containment and eradication work is sufficiently complete.
Indicators of attack are behavioral signs that suggest malicious activity or attacker techniques are being used, even when a clear compromise artifact is not yet known.
Memory forensics is the analysis of volatile system memory to recover evidence about running processes, connections, credentials, and other activity that may not be preserved elsewhere.