SMG IS 223 Study Guide - Final Guide: Disaster Recovery

24 views1 pages
Attachments with malicious software
Transmitting trade secrets
Social engineering - pretending to be someone to get info from you
READ THROUGH SYSTEM CONTROLS & UNDERSTAND WHAT THEY ARE
o Use policy - what you do with the information , how you're defining classifications of
information , what's secure , whats sensitive, what's available
o Access controls - defines, who can read, write and modify records - based on level- what
info you can access & can define what you can view transaction wise
o Disaster recovery vs. business continuity plan
Disaster recover - being able to come back without info being destroyed -
related to system
Continuity plan - how i am going to operate if system is down - how will
transactions be done, recorder, etc. -based on the time of year - how to send out
things
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 1 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents