8:00 a.m. – A terrorist group hacks into the local police department and Sherriff's office. The hacking causes the entire computer system to shut down, including all computer aided design software, record management systems, and operating systems on laptops.
8:10 a.m. - The local hospital's network has been compromised and is not allowing employees to access any of the computers.
8:20 a.m. - Fort Lauderdale Airport's computer system has completely shut down; the reason is unknown.
8:30 a.m. - Bank A, the largest bank in South Florida, found out that their system has been hacked into and millions of dollars have been stolen from numerous bank accounts.
Consider the following questions:
• What are the ramifications of these incidents?
• Who is affected?
• What may be the outcomes?
Imagine that you occupy one of the following positions: the police chief, the city mayor, the bank's chief executive officer, the airport's director of security, or the hospital's chief executive officer. In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.
Review the information from the Cyberattack Scenario.
Create a 10- to 15-slide Microsoft® PowerPoint® presentation that includes a step-by-step restoration and recovery plan. This plan must create strategies to restore information-system operations in the event of an attack or failure.
Make sure to address the following points in the step-by-step plan:
• In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.
• Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification.