In chapter 13, the author discusses a formal approach to handling computer security incidents. Proper communication is a critical factor in handling incidents effectively. Pick 3 separate steps in the incident handling process and explain how effective communication can limit the damage an incident could potentially cause. Address safety, monetary damage, and reputation impact as each step you chose. Provide a concrete example to explain your choices.