SMG IS 223 Study Guide - Final Guide: Disaster Recovery
▪ Attachments with malicious software
▪ Transmitting trade secrets
• Social engineering - pretending to be someone to get info from you
• READ THROUGH SYSTEM CONTROLS & UNDERSTAND WHAT THEY ARE
o Use policy - what you do with the information , how you're defining classifications of
information , what's secure , whats sensitive, what's available
o Access controls - defines, who can read, write and modify records - based on level- what
info you can access & can define what you can view transaction wise
o Disaster recovery vs. business continuity plan
▪ Disaster recover - being able to come back without info being destroyed -
related to system
▪ Continuity plan - how i am going to operate if system is down - how will
transactions be done, recorder, etc. -based on the time of year - how to send out
things
find more resources at oneclass.com
find more resources at oneclass.com