this is a scenario specific forensic response plan for the following major systems within the organization: materials requirements
planning, distribution, finance, and intellectual property/document management. This would include a forensic investigative response
approach for suspected security breach/unauthorized access of each of the four major systems previously listed, as well as a catastrophic
failure of each system. Response approaches should include people, equipment, tools/technologies, and other considerations. The plans
should also include a priority classification for the various aspect of the systems involved in the breach or failure, as well as a
sequenced staging plan for when and how systems can be brought online as part of the business continuity effort. You should identify the
key forensic artifacts and how they can be preserved for investigation and potential legal pursuit. Your artifacts must be preserved in a
state that can provide proper attribution of the security breach or catastrophic failure.