Execute the IT Management Simulation: Cyber Attack!1.Assess Online Retail Co (ORC) information assurance monitoring and methods capabilities. Formulate recommendations to address vulnerabilities.2. Identify incident handling procedures undertaken to manage the consequences of the breach that minimize both tangible and intangible damage.3.Can computer forensics be used to examine and analyze this cyber attack event? Briefly outline an accepted set of processes that could be used.4.Does backup and restoration have a role in ORCs intent to recover normal operation? If yes, briefly describe the role. If no, briefly justify why not role exists.