I will be creating a power-point presentation that includes a step-by-step restoration and recovery plan. Please set the paper up so it will be easier for me to do my point point. Base on the questions below, please highlight each topic. Below is is the cyber-attack scenario that I have to use to create the paper and PowerPoint.
This plan must create strategies to restore information-system operations in the event of an attack or failure.
Make sure to address the following points in the step-by-step plan:
In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.
Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification.
Format your presentation consistent with APA guidelines.
Use the Cyberattack Scenario to complete the Week Five Individual Assignment.
Location: Fort Lauderdale, Florida
8:00 a.m. A terrorist group hacks into the local police department and Sherriff’s office. The hacking causes the entire computer system to shut down, including all computer aided design software, record management systems, and operating systems on laptops.
8:10 a.m. – The local hospital’s network has been compromised and is not allowing employees to access any of the computers.
8:20 a.m. – Fort Lauderdale Airport’s computer system has completely shut down; the reason is unknown.
8:30 a.m. – Bank A, the largest bank in South Florida, found out that their system has been hacked into and millions of dollars have been stolen from numerous bank accounts.
Consider the following questions:
> What are the ramifications of these incidents?
> Who is affected?
> What may be the outcomes?
Imagine that you occupy one of the following positions: the police chief, the city mayor, the bank’s chief executive officer, the airport’s director of security, or the hospital’s chief executive officer. In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.