Learn Malicious
Study Malicious using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards2Learners -
Torts I
Torts I
By: Pauline Nguyen
Introduction, Intentional Torts - Causes of Actions, Intentional Torts - Defenses ...14Decks111Flashcards1Learner -
sscp
sscp
By: Paul Gurnig
Administration, ceh, Monitoring ...18Decks88Flashcards15Learners -
Security Plus
Security Plus
By: Sam Bat
Fundamentals, Threats and Vulnerabilities, Confidentiality ...18Decks227Flashcards1Learner -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning ...21Decks420Flashcards1Learner -
Cysa+
Cysa+
By: Faisal Iqbal
Understandinf Vulnerability Response, Handling, And Management, Exploring Threat Intelligence and Threat Hunting Concepts, Explain Important System and Network Architecture Concepts ...15Decks195Flashcards1Learner -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning ...22Decks524Flashcards1Learner -
Criminal Law B: crimes against property
Criminal Law B: crimes against property
By: Zohn-Rae Ludick
Fraud, malicious damage to property, Possession of Stolen Property ...6Decks57Flashcards1Learner -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning ...21Decks290Flashcards30Learners -
Criminal Law (Book 2-Title 2)
Criminal Law (Book 2-Title 2)
By: Toby Duag
Article 124 Arbitrary Detention, Article 125 Delay in the delivery of detained persons to the proper judicial authorities, Article 126 Delaying Release ...10Decks53Flashcards19Learners -
Security Comp TIA 701
Security Comp TIA 701
By: Dominic Asio
Security Controls 1.1, THE CIA/AIC Triad 1.2, Non-Repudiation 1.2 ...75Decks712Flashcards3Learners -
law
law
By: Millicent Woods
concepts, Theft Robbery and Burglary, Murder ...27Decks145Flashcards1Learner -
My CISSP Official Summary
My CISSP Official Summary
By: Unknown Unknown
Chap 11: Secure Network Architecture and Components, Chap 10: Secure Communications and Network Attacks, Chap 15: Security Assessment and Testing ...7Decks121Flashcards1Learner -
Terminology drill
Terminology drill
By: Merel Roest
Basic computer key terms, Phishing, Malicious software3Decks39Flashcards1Learner -
Course 5 - IT Security: Defense against the digital dark arts
Course 5 - IT Security: Defense against the digital dark arts
By: Jelly Santi
Week 1 - Malicious Software, Week 1 - Network Attacks, Week 1 - Other Attacks ...11Decks187Flashcards1Learner -
VD Exam2
VD Exam2
By: Alex Moorman
Securing Voice Over Network Assets, Malicious and Mobile Code (Lesson 9), Identification and Authentication (Lesson 10) ...8Decks147Flashcards2Learners -
Criminal Law - Offences
Criminal Law - Offences
By: Steven Lynch
Murder, Culpable Homicide, Inchoate Offences ...13Decks148Flashcards1Learner -
Torts 1
Torts 1
By: Rachael Rebich
Intentional Torts, Intentional Tort Defenses, Intentional Tort Privileges ...17Decks80Flashcards1Learner -
Security+
Security+
By: elham hamid
1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts, 1.4 Explain the importance of using appropriate cryptographic solutions. ...12Decks267Flashcards2Learners -
Criminal Law
Criminal Law
By: Gabrielle Stockton
Actus Reus - Omissions, Actus Reus - Causation, Mens Rea - Intention ...25Decks201Flashcards1Learner -
Criminal Law
Criminal Law
By: Karolina Kusal
Actus Reus, Mens Rea, Causation ...29Decks304Flashcards1Learner -
Torts II
Torts II
By: alexia Lopez
Products Liability (PL), Defamation, Misrepresentation ...15Decks165Flashcards2Learners -
Law
Law
By: archie wood
Causation, Assault [Non-Fatal Offences], Battery [Non-Fatal Offences] ...65Decks547Flashcards3Learners -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards1Learner -
Crimes Against Property
Crimes Against Property
By: Roshan Mathew
Car Jacking, Burglary and Robbery, Trespass ...8Decks25Flashcards4Learners -
Law
Law
By: Alyosha Knaap
S39 - Assault & Battery, S18 - Wounding or Causing GBH With Intent, S20 - Malicious Wounding or Inflicting GBH ...7Decks57Flashcards1Learner -
Crime Knowledge Check
Crime Knowledge Check
By: Julie Egavas
Homicide, Direct Measures, Fraud ...17Decks76Flashcards2Learners -
CompTIA Security+
CompTIA Security+
By: Justin Pence
1. Today's Security Professional, 2. Cybersecurity Threat Landscape, 3. Malicious Code ...5Decks55Flashcards1Learner -
IT security
IT security
By: Jonathan Aka
Malicious attacks ,Threats and vulnerabilities, malicious attacks,threats andvulnerabilities2Decks23Flashcards1Learner