Learn Infommation Security
Study Infommation Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
IS3350 LEGAL ISSUES IN INFORMATION SECURITY
IS3350 LEGAL ISSUES IN INFORMATION SECURITY
By: Barbara Crable
IS3350 CHAPTER 1, IS3340 CHAPTER 2, IS3350 CHAPTER 3 ...15Decks469Flashcards447Learners -
CISSP - Certified Information Systems Security Professional
CISSP - Certified Information Systems Security Professional
By: Abran Tapia
1 - Security Governance, 2 - Personnel Security and Risk Management, 3 - Business Continuity Planning ...20Decks504Flashcards128Learners -
Information Security
Information Security
By: Felix Hüneburg
Introduction, L2 - Securicy Policies, Social Engineering ...11Decks230Flashcards100Learners -
xx. Udemy - CISM Domain 1 - Information Security Governance
xx. Udemy - CISM Domain 1 - Information Security Governance
By: C MC
01. Governance vs Management, 02. Standards and Frameworks, 03. Info Sec Gov: Values, vision, mission, and plans ...34Decks360Flashcards14Learners -
C836-Fundamentals of Information Security
C836-Fundamentals of Information Security
By: Markee Colston
Chapter 1: What is Information Security?, Chapter 2: Identification and Authentication, Chapter 3: Authorization and Access Control ...9Decks192Flashcards121Learners -
Information Systems Security
Information Systems Security
By: Enrico Carraro
Security of network applications, Firewall and IDS/IPS, Network Security ...7Decks340Flashcards21Learners -
CISM: 1- Information Security Governance
CISM: 1- Information Security Governance
By: Makponse Yamonche
A-Overview, B- Business Alignment, C-Board of Directors and Strategy ...12Decks215Flashcards55Learners -
C836 Fundamentals of Information Security
C836 Fundamentals of Information Security
By: Yakkie Poo
Chapter 1, Chapter 2, Chapter 3 ...14Decks336Flashcards19Learners -
Information Security Fundamentals
Information Security Fundamentals
By: Glenn Bawa
Part 1, Part 2, Part 3 ...9Decks208Flashcards59Learners -
ITEC85A - Information Assurance And Security 1
ITEC85A - Information Assurance And Security 1
By: J D
Lecture 1 - Introduction to Information Security, Lecture 2 -, Lecture 2B ...9Decks836Flashcards2Learners -
CISM (Certified Information Security Manager)
CISM (Certified Information Security Manager)
By: Stephen Holden
Exam Misses, CISM Audible Exam Quiz Phil Martin, CISM Vocabulary3Decks176Flashcards106Learners -
ACCT 5378 - Control & Security of Financial Information
ACCT 5378 - Control & Security of Financial Information
By: Alejandro Hasselmeyer
Chapter 1 - Introduction to Information Security, Chapter 2 - The Need for Security, Chapter 3 - Legal, Ethical and Professional Issues in Information Security ...8Decks302Flashcards8Learners -
Fundamentals of Information Systems Security
Fundamentals of Information Systems Security
By: kalmah norther
Chapter 1 Assessment, Chapter 1 Key Concepts and Terms, Chapter 2 Assessment ...8Decks241Flashcards10Learners -
ITE18 - Information Assurance and Security
ITE18 - Information Assurance and Security
By: MARQUEZ, Sofiah Illyzah G.
Lesson 1, Lesson 2, Lesson 3 ...4Decks122Flashcards8Learners -
Information Systems Security
Information Systems Security
By: Vanessa Larivei
Intro, Cryptography, Authentication ...8Decks382Flashcards1Learner -
Intro to Information Security
Intro to Information Security
By: Noel Mora
Intro to IS, IT APPLICATIONS, IT APPLICATIONS PART 2 ...11Decks195Flashcards2Learners -
Advanced Information Security
Advanced Information Security
By: W R
Chapter 5, Chapter 6, Chapter 8 ...7Decks551Flashcards7Learners -
Information System Security Management
Information System Security Management
By: Marwan Saeed
Chapter 1, Chapter 3, Chapter 4 ...9Decks117Flashcards11Learners -
Information Security
Information Security
By: Jomana Sherif
Chapter 1, Chapter 2 Crypto Basics, Chapter 3 Symmetric Key Crypto ...5Decks268Flashcards22Learners -
Information Security
Information Security
By: W R
Chapter 1, Chapter 2, Chapter 3 ...9Decks261Flashcards6Learners -
06. CISM - Chapter 6 - Information Security Program Management
06. CISM - Chapter 6 - Information Security Program Management
By: C MC
01. Information Security Control Design and Selection (240), 02. Information Security Control Implementation and Integrations (265), 03. Cryptography (299) ...10Decks261Flashcards5Learners -
Information Security
Information Security
By: victor chabba
CIA, COBiT, TOGAF ...10Decks130Flashcards12Learners -
Information Systems Security
Information Systems Security
By: Aimee Robinson
Week 1:Introduction to the Module. What is Security?, Week 2: Security policies. Safety and security usability., Week 3: Psychology and Social Engineering ...9Decks143Flashcards3Learners -
Fundamentals of Informations Systems Security
Fundamentals of Informations Systems Security
By: Jose Mena
Chapter 1, CCNA V72Decks137Flashcards18Learners -
information security
information security
By: Rami Hamadeh
Exam 1, final exam, quiz 1 ...4Decks113Flashcards5Learners -
Domain 03 - Information Security Governance and Risk Management
Domain 03 - Information Security Governance and Risk Management
By: Sydney Sacolles
Key Terms 1, Key Terms 2, Key Terms 3 ...11Decks112Flashcards15Learners -
Fundamentals of Information Security - D430
Fundamentals of Information Security - D430
By: Ernesto Gastelum
D430, WGU's D430, Glossary ...4Decks325Flashcards2Learners -
Information Security Management
Information Security Management
By: Xyrus Unknown
Chapter 3: Physical Access Controls - Part 2, Chapter 4: Identity and Access Management - Section A, Chapter 4: Identity and Access Management - Section B ...4Decks204Flashcards1Learner -
Information Security
Information Security
By: Christian Edvall
L2 - Passwords and password cracking, F3 - Threats, L4 Malicious Software and Application Attacks ...9Decks184Flashcards6Learners -
Fundamentals of Information Security
Fundamentals of Information Security
By: Luke Skarstedt
Introduction, Identification and Authentication, Authorization and Access Control ...8Decks266Flashcards4Learners