Learn Data Security
Study Data Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CSX
CSX
By: L Lawliet
Section 1: Cybersecurity Introduction, Section 2: Cybersecurity Concepts, Section 3: Security Architecture4Decks248Flashcards20Learners -
Z/ HIGHER Computing Science
Z/ HIGHER Computing Science
By: Jill Beard
"SDD", "ISDD", SDD Notes lol N527Decks1,061Flashcards48Learners -
DP-200 + DP-201 = DP-203
DP-200 + DP-201 = DP-203
By: Brad Lynch
Design & Implement Data Storage, Design and Develop Data Processing, Design and Implement Data Security4Decks65Flashcards3Learners -
RFBT
RFBT
By: Fair Anthonie Chaclag
Corporation Law, Cooperative Law, Ease of Doing Business29Decks1,406Flashcards69Learners -
Computer science
Computer science
By: Fadekemi Odu-onikosi
hexadecimal, data transmission, Error checking methods13Decks137Flashcards31Learners -
Comptia Network+
Comptia Network+
By: David H
Network Theory, Bounded Network Media, Unbounded Network Media9Decks483Flashcards3Learners -
Web Technologies, Users, and Management
Web Technologies, Users, and Management
By: Oscar Leander
Web Usability, XLM, Data Object Model (DOM)11Decks200Flashcards6Learners -
Security+ Get Certified Get Ahead SY0-501
Security+ Get Certified Get Ahead SY0-501
By: Jennifer Kajiwara
Chapter 1 Mastering Security Basics, Chapter 2 Understanding Identity and Access Management, Chapter 3 Exploring Network Technologies and Tools11Decks1,443Flashcards4Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes.24Decks640Flashcards47Learners -
Comp TIA Sec+
Comp TIA Sec+
By: chris miller
PORTS, Securing Host and Data2Decks42Flashcards18Learners -
HEALTH INFORMATION SYSTEM
HEALTH INFORMATION SYSTEM
By: Denzeline Go
HEALTH INFORMATION SYSTEM (CHAPTER 5; MIDTERM), HEALTH MANAGEMENT INFORMATION SYSTEM (CHAPTER 6; MIDTERM), LABORATORY INFORMATION MANAGEMENT SYSTEM (CHAPTER 10; PREFINALS)8Decks309Flashcards15Learners -
Security+
Security+
By: Rob Jones
Port Numbers, Cryptography, Hash9Decks102Flashcards1Learner -
Computing
Computing
By: William Morgan
1) Hardware, 2) Logical Operations, 3) Communication16Decks126Flashcards1Learner -
AWS
AWS
By: Daniel Lemke
Facts, Storage, Product Names16Decks726Flashcards1Learner -
AWS SysOps Questions
AWS SysOps Questions
By: Mohamed Tleis
Monitoring and Reporting, High Availability, Deployment & Provisioning5Decks135Flashcards1Learner -
AWS Data Analytics
AWS Data Analytics
By: Benjamin Frederick
Domain 4: Analysis, Domain 5: Visualization, Domain 6: Security9Decks289Flashcards43Learners -
Luminary Tenets
Luminary Tenets
By: Naomi Pierce
Advanced Editing and Form Processing, Advanced Targeting and Segmentation, E10: Managing Social Media (WBT)29Decks3,551Flashcards40Learners -
Computer Science - FINAL
Computer Science - FINAL
By: Mishaan Parmar
File Handling code - NOT IN SPEC NOW, 1 - Fundamentals of algorithms, 2 - Programming10Decks233Flashcards2Learners -
RICS APC Valuation Pathway
RICS APC Valuation Pathway
By: Christie Harvey
Ethics, Local Taxation, Health and Safety21Decks290Flashcards82Learners -
APC
APC
By: Matthew Keating
Diversity, Legislation and Documents, Client Care32Decks552Flashcards3Learners -
A-Level Computer Science
A-Level Computer Science
By: Ralph Hargreaves
Theory Of Computation, Regex Symbols, Fs Of Data Structures17Decks327Flashcards2Learners -
Computing
Computing
By: Mark Kennedy
Topic 1-Algorithms, Topic 2-Programming, Topic 5-Networks8Decks327Flashcards2Learners -
IT & Data Assurance I (IST293)
IT & Data Assurance I (IST293)
By: Kathryn Cox
Module 1 - Introduction to Security, Module 2: Threat Management & Cybersecurity Resources, Module 4: Endpoint & Application Development Security15Decks655Flashcards1Learner -
Cyber Security Building Blocks
Cyber Security Building Blocks
By: John Booth
Host Based Security, Network-Based Security, Protection for Data in Transit5Decks70Flashcards1Learner -
Security+ Cert Darril Gibson
Security+ Cert Darril Gibson
By: PO1 Allen
Chapter 1 Mastering Security Basics, Other Questions, Chapter 2 Understanding Identity and Access Management12Decks307Flashcards12Learners -
Comp own
Comp own
By: Amrita Rana
Chap 1 - no. systems, [text, sound, video, image], [data storage and file compression], Chap 5.1 - Internet and WWW, digital currency, Chap 5.2 - cyber security threats9Decks410Flashcards1Learner -
BSA 33P
BSA 33P
By: Angel Lea Regalado
Chapter 1 [Quality Audit: Why It Matters], Chapter 5 [Professional Auditing Standards and the Audit Opinion Formulation Process], Chapter 2 [The Auditor’s Responsibilities Regarding Fraud and Mechanisms to Address Fraud: Regulation and Corporate Governance]22Decks1,801Flashcards4Learners -
OCR ICT unit 3
OCR ICT unit 3
By: Marshall Blanc
Threats to Cyber Security, Types of Cyber Attacker, Cyber Security - Identifying Assets & Risks14Decks133Flashcards20Learners -
Computer Science IGCSE
Computer Science IGCSE
By: Tanvi Praveen
Data Representation, Programming, Hardware and software5Decks196Flashcards6Learners -
Computer Science
Computer Science
By: Zyrill Evarrete
Hardware #1, Logical operations #2, Communication #314Decks353Flashcards3Learners