Cyber-attack scenario Name Institution Professor Course Date Abstract Information Communication Technology has indeed revolutionized the various aspects of the human life and made many of our life’s affairs very simple. The technology has been employed in various industries and it has made the business processed quite simple by coding sorting customizing and summarizing the processes. But the ICT has alongside brought about unintended consequences in the form of various cyber-crimes. The cyber-crimes have indeed affected many of the industries in our world today with the banking sector suffering some of the effects of computer hacking through activities such as denial of service ATM frauds identity theft as well as Phishing (Hathaway et al. 2012). This paper will discuss the problem of computer hacking particularly in the banking sector and the impacts it has on various components of the banking industry at large. The paper also assessed the computer hacking unite and connect the computers of the bank. That way I think I will have taken care of the many potential risks associated with the hacking of the computer systems. Also the condition of the systems needs to be checked regularly and taking care of whatever needs to be detected in its due time. Where there is a person taking care purposely of those computer systems there is a sense of assurance that someone is constantly in check of what might be taking place in them. References Choo K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security 30(8) 719-731. Hathaway O. A. Crootof R. Levitz P. Nix H. Nowlan A. Perdue W. & Spiegel J. (2012). The law of cyber-attack. California Law Review 817-885. Taylor R. W. Fritsch E. J. & Liederbach J. (2014). Digital crime and digital terrorism. Prentice Hall Press. [...]
Review the information from the Cyberattack Scenario. Create a 10- to 15-slide Microsoft® PowerPoint® presentation that includes a step-by-step restoration and recovery plan specific to the position you select from the Cyberattack scenario. This plan must create strategies to restore information-system operations in the event of an attack or failure. Make sure to address the following points in the step-by-step plan: In relation to the position you selected (from the Cyberattack Scenario), identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime. Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification. Format your Microsoft® PowerPoint® presentation consistent with APA guidelines.