Learn Data Security
Study Data Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
APC
APC
By: Cally Nugent
Mandatory, Valuations, Inspection & Measurement ...8Decks579Flashcards2Learners -
CIIP
CIIP
By: Hunter Maureen
Software and Networking, Data Storage, Data Security & Patient Privacy ...6Decks328Flashcards1Learner -
CompSci
CompSci
By: Gleb Butyagin
Data Transmission and Data representation, Security Aspects and Internet Technologies, Computer Architecture and Languages ...15Decks361Flashcards7Learners -
Security+
Security+
By: Matt Miller
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers ...13Decks484Flashcards124Learners -
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT ...23Decks463Flashcards133Learners -
AD
AD
By: Anna Bergin
Storage, Compute (EC2), Deployment (Elastic Beanstalk, Cloud Formation, Code Deploy, Code Pipeline)) ...21Decks575Flashcards1Learner -
Computer Science
Computer Science
By: Jacob Heyes
Organisation and Structure of Data, Hardware, Data Security ...6Decks208Flashcards1Learner -
Salesforces
Salesforces
By: Chester Salcedo
Admin Cert, Interview Question: Salesforce Basics, Interview questions: Object Relationships ...8Decks604Flashcards35Learners -
AS- Level WJEC CS SAQ
AS- Level WJEC CS SAQ
By: Milen 123
1.1 Hardware and communication, 1.2 Logical operations, 1.3 Data Transmission ...14Decks477Flashcards2Learners -
GCSE Computer Science - AQA 8525
GCSE Computer Science - AQA 8525
By: Mark Kennedy
1 Fundamentals Of Algorithms, 2 Programming, 3 Fundamentals Of Data Representation ...7Decks559Flashcards70Learners -
Digital Technology Theory
Digital Technology Theory
By: Eleanor Osborne
2.1 Data, 2.2 Digital Systems, 2.3 Digital Communciation ...5Decks168Flashcards2Learners -
Security+ 701
Security+ 701
By: Charlie Aligaen
Sample Exam 1, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts. ...28Decks777Flashcards3Learners -
A - Level Computer Science
A - Level Computer Science
By: Calin Ghiorghita
1.1.1 FDE, CPU, Von Neumann., 1.1 Buses, Programming, 1.1 Processors ...31Decks416Flashcards4Learners -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
European Data Protection CIPP E
European Data Protection CIPP E
By: Zleste Wanner
Data Protection Laws (1), Personal Data (2), Controllers and Processors (3) ...12Decks450Flashcards7Learners -
AIT 670
AIT 670
By: Tyler S
Week 2: Introduction to Cloud Computing, Week 3: Overview of Networking Concepts, Week 4: Overview of Security Concepts ...11Decks647Flashcards1Learner -
AWS Data Specialty
AWS Data Specialty
By: Edson Andrade
AWS Data Collections, AWS Data Storage, AWS Data Processing ...20Decks961Flashcards4Learners -
CIPP-US
CIPP-US
By: Christina Russell
Ch 1 - Intro to Privacy, Ch 2 - Structure of U.S. Law, Ch 3 - Fed & State Regulators ...14Decks1,111Flashcards180Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%) ...4Decks477Flashcards106Learners -
security+
security+
By: James Klausmeyer
Basic security controls and data, Acronyms, Ports3Decks177Flashcards1Learner -
Comp sci
Comp sci
By: Amrita Rana
Chap 1 - Data representation (no. systems, [text, sound, video, image], [data storage and file compression]), Chap 2.1 - data transmission, Chap 2.2 / 3 - Data transmission (error checking, encryption) ...16Decks693Flashcards1Learner -
IT & Data Assurance I (IST293)
IT & Data Assurance I (IST293)
By: Kathryn Cox
Module 1 - Introduction to Security, Module 2: Threat Management & Cybersecurity Resources, Module 4: Endpoint & Application Development Security ...15Decks655Flashcards20Learners -
Introduction to Information Systems for Health Information Technology
Introduction to Information Systems for Health Information Technology
By: Justin Duff
Chapter 1 - Introduction to Computers in Health Information Management, Chapter 2 - Information Integrity and Data Quality, Chapter 3 - Introduction to Databases and Data Analytics ...11Decks421Flashcards33Learners -
CCNA Security 210-260
CCNA Security 210-260
By: Brian Schroeder
Network Security Concepts, Common Security Threats, Implementing AAA in Cisco IOS ...21Decks567Flashcards225Learners -
Information Technology
Information Technology
By: Deleted Deleted
Hardware Basics, Operating System Basics, Networking Basics ...16Decks247Flashcards157Learners -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery ...16Decks329Flashcards27Learners -
OCR ICT unit 3
OCR ICT unit 3
By: Marshall Blanc
Threats to Cyber Security, Types of Cyber Attacker, Cyber Security - Identifying Assets & Risks ...14Decks133Flashcards53Learners -
Health Information System
Health Information System
By: Jhio Camarin
concepts of data privacy, Health Information system, Ethics, Data Privacy and Security in Health Informatics3Decks103Flashcards21Learners -
APC TH
APC TH
By: Tom Hughes
Purchase & Sale, Estate Agency Legislation, Leasing & Letting ...15Decks643Flashcards2Learners -
AWS SAA
AWS SAA
By: Jeremy Lim
VPC, Storage, S3 ...20Decks605Flashcards5Learners