Learn Information Security Management
Study Information Security Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sgt Study GUI
Sgt Study GUI
By: Steve Rista
5.1 Correspondence Manual, 9.1 Employee Relations, 9.2 Substance Manual ...42Decks728Flashcards5Learners -
Accounting Information System
Accounting Information System
By: Diep Khac
1. Accounting Information System, 2. Overview of Transaction Processing and Enterprise Resource Planing Systems., 3. System Documentation Techniques ...19Decks191Flashcards16Learners -
IT Infrastruktur ITIL Practices können mit hintergrund
IT Infrastruktur ITIL Practices können mit hintergrund
By: Firat Özkök
03 Information Security Management, 06 Organizational Change Management (19 ü 5 Seiten), 15. Availability Management (3 10 Seiten) ...5Decks42Flashcards1Learner -
CIPP-US = 981 Cards
CIPP-US = 981 Cards
By: Ricardo N.
Structure of US Law, Enforcement of U.S. Privacy and Security Laws, Information Management from a U.S. Perspective ...14Decks981Flashcards4Learners -
ISO 27001 Foundational
ISO 27001 Foundational
By: S D
Module 1 - The Basics, Module 2 - Documentation and management systems, Module 3 - Information Security ...5Decks64Flashcards3Learners -
Security Blue - Security Information & Event Monitoring (SIEM)
Security Blue - Security Information & Event Monitoring (SIEM)
By: ola sijuwola
Security Information Management, Security Event Management, SIEM ...21Decks181Flashcards7Learners -
CA 8
CA 8
By: Jake P
8.1.1 Maintaining privacy and confidentiality of an organisation's information and that of stakeholders, 8.1.2 The potential impact of failing to maintain privacy and confidentiality, 8.1.3 Potential technical threats and vulnerabilities to systems, data and information ...7Decks61Flashcards15Learners -
CPP GUIDE Q&A
CPP GUIDE Q&A
By: Robert Harkort
CHAPTER 3: INVESTIGATION, CHAPTER 4: PROTECTION OF SENSITIVE INFORMATION, CHAPTER 5: SUBSTANCE ABUSE ...7Decks391Flashcards2Learners -
cct225: Information Systems
cct225: Information Systems
By: Sarah Ohene-manu
Chapter 1: Management Information Systems: Business Driven MIS, Chapter 2: Decisions and Processes: Value Driven Business, Chapter 3: E-business: Electronic Business Value ...8Decks99Flashcards7Learners -
Operational Risk
Operational Risk
By: Joey Rigden
Chapter 1: Risk Identification Tools, Chapter 2: Scenario Identification Process, Chapter 3: Risk Definition and Taxonomy ...20Decks437Flashcards1Learner -
PHRM 161
PHRM 161
By: Sarah L
Week 1: Health Informatics Concepts, Week 2: Health Information Systems, Privacy, Security, and Ethical Considerations, Week 3: EHR I, Data Sovereignty ...12Decks362Flashcards2Learners -
ICT A2
ICT A2
By: Emelda Braimoh
4.3.3 Human Computer Interface (HCI), 4.3.4 Working with ICT, 4.3.5 ICT Security Policies ...9Decks109Flashcards5Learners -
Information Management
Information Management
By: Adam Greaney
Information management, Cyber security issues + defence mechanisms, Main people/organisations responsible for cyber attacks ...6Decks58Flashcards3Learners -
General Orders 600's
General Orders 600's
By: Cameron King
600-01 Response Management, 600-02 Beat Accountability, 600-03 General Broadcasts ...39Decks885Flashcards4Learners -
CompTIA
CompTIA
By: Caitlin Ricks
Computer Memory Measurements, 1.1 Notational Systems, 1.2 Data Types and Characteristics ...23Decks401Flashcards3Learners -
CISSP CBK
CISSP CBK
By: Cliff Barnes
General Concepts, Information Security Governance, Risk Management ...4Decks137Flashcards2Learners -
Information and Data
Information and Data
By: Lilly Adams
Types of Information and Data protected by Legislation, How Businesses manage Information and Data and why these Methods are used, Rights of Individuals regarding their own Information and Data ...7Decks105Flashcards2Learners -
BCOR 1015 Review
BCOR 1015 Review
By: Chris Gerlacher
Adding value and major types of businesses, 3 Steps From Consumer To Business Professional, 5 Major Environments Businesses Operate In ...53Decks587Flashcards191Learners -
MGMT 250: Information Technology Management
MGMT 250: Information Technology Management
By: Kale Blakely
Chapter 1: The Importance of MIS, Chapter 10: Acquiring Information Systems Through Projects, Chapter 11: Structure, Governance, and Ethics ...7Decks345Flashcards1Learner -
CertMaster Practice for Project+
CertMaster Practice for Project+
By: Sebastian Hernandez Morro
1.1 Explain basic characteristics of projects, and methodologies & frameworks used in IT projects, 1.2 Compare and contrast Agile vs. Waterfall concepts., 1.3 Given a scenario, apply the change control process throughout the project life cycle.1.3 Given a scenario, apply the change control process throughout the project life cycle. ...24Decks290Flashcards1Learner -
SC-900
SC-900
By: Elizabeth Sanchez
Describe Security and Compliance Concepts, Describe Identity Concepts, Describe the function and identity types of Microsoft Entra ID ...15Decks102Flashcards3Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards74Learners -
IMKM
IMKM
By: Lewon Simonian
1 - Information & Knowledge Management: Fundamentals, 2 Strategy & Information Management I (Business IT Alignment), 3 Strategy & Information Management II (IT-enabled Strategies) ...11Decks141Flashcards2Learners -
IT auditing Job Interview
IT auditing Job Interview
By: Host Mom
Risk Management, Detailed Anwsers, IT Auditing - Information Security Control ...33Decks442Flashcards9Learners -
Security+
Security+
By: Jerry Pacheco
Security+ 1.1 Prof. Messer, Security+ 1.2 Prof. Messer, CompTIA Security+ TB 3.0 Security Tech And Tools ...10Decks139Flashcards3Learners -
BEC
BEC
By: Abel Jay
B3-FINANCIAL MANAGEMENT-LEVERAGE, B3-FINANCIAL MANAGEMENT-WACC, B3-FINANCIAL MANAGEMENT-ASSET EFFECTIVENESS AND EFFICIENCY ...18Decks305Flashcards1Learner -
MIS2
MIS2
By: roel hurkmans
1 - H1 managing in the digital world, 2- H3 information technologie & systemen, 3- competitive advantage & E-commerce (H2&4) ...7Decks77Flashcards1Learner -
CIPP/US
CIPP/US
By: Sarah McD
I-A: Introduction to Privacy, I-B: Structure of U.S. Law, I-C: Enforcement of Privacy & Data Security Laws ...5Decks464Flashcards1Learner -
Introduction to business
Introduction to business
By: Henry Castillo
Types of Business Ownership, THE DYNAMIC BUSINESS ENVIRONMENT, Production ...19Decks318Flashcards2Learners -
Cyber security Introductory RG flashcards
Cyber security Introductory RG flashcards
By: aaron nehus
.01 RG Vocab introduction to cyber security, .02 RG Vocab Information Security & Risk Management, .03 RG Vocab network security ...8Decks292Flashcards1Learner