Learn Data Protection
Study Data Protection using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Computer Science
Computer Science
By: Yong Han
BC1-Hardware and Software, BC2- IPO Model, BC3- Computer System Storage ...28Decks313Flashcards3Learners -
PSY2029 Qualitative Research Methods
PSY2029 Qualitative Research Methods
By: Laura Mantle
Introduction to Qualitative Methods, Designing and Conducting Interviews, Reflexivity ...15Decks184Flashcards1Learner -
ICT UNIT 2 - REVISION
ICT UNIT 2 - REVISION
By: Jake Sandhu
Information styles and their uses, Information classification, Quality of information ...15Decks104Flashcards10Learners -
IF2
IF2
By: Ewan Carson
Chapter 1 - Motor Insurance, Chapter 2 - Health Insurance, Chapter 3 - Package Policies ...13Decks232Flashcards6Learners -
AAI - IT- UNIT 2
AAI - IT- UNIT 2
By: Sehar Hussain
LO1 - 1.1 Holders Of Infrmation, LO1 - 1.2 Types Of Information Storage Media, LO1 - 1.3 Types Of Information Access And Storage Devices ...15Decks120Flashcards1Learner -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors ...14Decks231Flashcards1Learner -
computer science
computer science
By: Deborah Tipler
email scam, computer misuse, Protecting personal data ...4Decks77Flashcards1Learner -
system design interview questions
system design interview questions
By: se7en coding
Basics of High-Level System Design, Functional vs Non-Functional Requirements, Monolith vs Microservices ...18Decks633Flashcards6Learners -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3 ...134Decks913Flashcards6Learners -
CCNA Security 210-260
CCNA Security 210-260
By: Brian Schroeder
Network Security Concepts, Common Security Threats, Implementing AAA in Cisco IOS ...21Decks567Flashcards225Learners -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards153Learners -
MARC AS 737
MARC AS 737
By: Marc Krueger
FH Limitations (8/17/23), Recall (11/15/2022), 1/18/23 AIRPLANE GENERAL, EMERGENCY EQUIPMENT, DOORS AND WINDOWS ...20Decks656Flashcards1Learner -
Law
Law
By: Hadiyah Qureshi
PL&E: Sources and Types of Law, PL&E - Regulation and Classification of Medicines, Professional and Legal issues: POM ...16Decks148Flashcards7Learners -
Security+ SY0-601
Security+ SY0-601
By: Jonathan Mason
Chapter 1: Mastering Security Basics, Chapter 2: Understanding Identity and Access Management, Chapter 3: Exploring Network Technologies and Tools ...11Decks409Flashcards4Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
LPC
LPC
By: Lindsay Moreno
Course 1 - Leadership Principles Sections 101 & 104, Course 1 - Leadership Principles Sections 102 & 105, Course 1 - Leadership Principles Sections 103 & 106 ...21Decks598Flashcards11Learners -
Computer Science
Computer Science
By: Ayushi Shah
Protecting personal data, E-Safety Terminology, Impacts of Online Communication3Decks26Flashcards1Learner -
SEC +
SEC +
By: D N
Acronyms, Vocab, Summary Q & A ...19Decks1,553Flashcards1Learner -
CIPM
CIPM
By: Kathleen Kramer
Intro Privacy Program Management, Privacy Governance, Laws and Regulations ...10Decks83Flashcards2Learners -
Professional Issues
Professional Issues
By: Josh Davidson
Part 1 - Ethical Analysis, Part 2 - Code Of Ethics, Week 2 - Information Governance ...11Decks162Flashcards2Learners -
Population Health
Population Health
By: Shia Dunning
Lecture 14 SEP, Lecture 15 Inequities and Inequalities, Lecture 16 Commercial Determinants ...21Decks430Flashcards4Learners -
RICS
RICS
By: Daniel Lustman
Ethics, Client Care, Comm and Nego ...11Decks207Flashcards1Learner -
CIPM MAY 2023
CIPM MAY 2023
By: Shreyas Amin
1. Intro To Privacy Program Management, 2. Frameworks and Governance, 3. Privacy Frameworks, Laws & Regulations ...11Decks93Flashcards4Learners -
ICT
ICT
By: ruth mahase
Computer Specifications, Data protection, Computational Thinking ...5Decks53Flashcards2Learners -
Social and Professional Issues of the Digital Age
Social and Professional Issues of the Digital Age
By: Ryan Storey
The History of Computing, Cryptography and Society, Cryptocurrency and Society ...9Decks124Flashcards2Learners -
Informations und Wissensmanagement
Informations und Wissensmanagement
By: Andreas Hein
Chapter1: What do “information” & “knowledge” really mean?, Chapter 2: Strategy and Information Management (Business IT Alignment), Tutorial 1: Analyzing IT-Strategy ...21Decks252Flashcards12Learners -
Ict: info 2
Ict: info 2
By: Bergina Obertinca
Topic 1: An Ict System And Its Components, Topic 5: The Need To protect data in ICT systems: privacy and password, Topic 2: Information And Systems ...8Decks184Flashcards6Learners -
ATPL(A) 022 Instrumentation
ATPL(A) 022 Instrumentation
By: David vanGarderen
022.01 Sensors and Instruments, 022.02 Measurement of Air Data Parameters, 022.03 Magnetism - Direct Reading Compass and Flux Valve ...14Decks169Flashcards15Learners -
Law
Law
By: Anna Crosby
1: Legal Principles and International Law, 2: Contract Formation, 3: Termination of Contract ...13Decks453Flashcards1Learner -
RFBT
RFBT
By: Anj Costelo
Secrecy of Bank Deposits (RA 1405), PDIC Act RA 3591, Truth in Lending Act (RA 3765) ...14Decks325Flashcards3Learners