Restoration and Recovery Plan

Resource: University of Phoenix Material – Cyberattack Scenario

Review the information from the Cyberattack Scenario.

Create a 10- to 15-slide Microsoft® PowerPoint® presentation that includes a step-by-step restoration and recovery plan. This plan must create strategies to restore information-system operations in the event of an attack or failure.

Make sure to address the following points in the step-by-step plan:

In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.
Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification.

Format your Microsoft®PowerPoint® presentation consistent with APA guidelines.

Cyberattack Scenario

Use the Cyberattack Scenario to complete the Week Five Individual Assignment.

Location: Fort Lauderdale, Florida

8:00 a.m. – A terrorist group hacks into the local police department and Sherriff’s office. The hacking causes the entire computer system to shut down, including all computer aided design software, record management systems, and operating systems on laptops.

8:10 a.m. – The local hospital’s network has been compromised and is not allowing employees to access any of the computers.

8:20 a.m. – Fort Lauderdale Airport’s computer system has completely shut down; the reason is unknown.

8:30 a.m. – Bank A, the largest bank in South Florida, found out that their system has been hacked into and millions of dollars have been stolen from numerous bank accounts.

Consider the following questions:

• What are the ramifications of these incidents?
• Who is affected?
• What may be the outcomes?

Imagine that you occupy one of the following positions: the police chief, the city mayor, the bank’s chief executive officer, the airport’s director of security, or the hospital’s chief executive officer. In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.


Do you lack time and skills to write this paper, We have expert writers in this subject who can handle all your questions in the shortest time. We promise and deliver quality ONLY. Our clients are always satisfied and come back for more of our custom essays.

We take plagiarism seriously. For this reason all essays are written from scratch and delivered to one client only. Another client ordering the same paper would get a totally different writer and paper altogether. Once done, our quality department checks the papers for plagiarism and grammar mistake using one of the premium plagiarism checkers on the internet. This eliminates any chances of plagiarism to 0. Once done, you have up to a month for unlimited revision and even more in case of a dissertation.

For this reason, you have no need to worry about the Quality and the originality of the papers we prepare.

ORDER today and enjoy yourself as we handle everything for you.

Order NOW