Problem
i. Which steps are in place to recover from actions intended to access, disable, degrade, or destroy the assets?
ii. Which type of recovery plan is needed for physical security breaches that occur at one of the critical areas in the facility?
iii. Which type of recovery plan is needed for cyber security breaches that occur at one of the critical areas in the facility?