This class was created by Brainscape user Amie Gray. Visit their profile to learn more about the creator.

Decks in this class (21)

Chapter 1 Mod 1
Security Concepts of information Assurance, Risk Management Process, Security Controls, Governance Elements and Processes, ISC2 Code of Ethics
64  cards
Chapter 1 mod 2
What is the primary connection be...,
How does the required level of cy...,
What is the role of evaluating ri...
92  cards
Chapter 1 mod 3
What do security controls encompass,
What is the purpose of implementi...,
In terms of information system pr...
40  cards
Chapter 1 mod 4
What is the primary purpose of an...,
What guides leaders and managemen...,
How do laws and regulations influ...
51  cards
Chapter 1 mod 5
What is the significance of isc2 ...,
What commitment is required of ev...,
Why is strict adherence to the is...
10  cards
Chapter 2 mod 1
Incident Response, Business Continuity, Disaster Recovery
43  cards
Chapter 2 mod 2
What is the primary intent of a b...,
What is a key component of a busi...,
What is the significance of estab...
15  cards
Chapter 2 mod 3
What is the goal of disaster reco...,
How does disaster recovery differ...,
What does the disaster recovery p...
12  cards
Chapter 3 mod 1
Acess control concepts, Physical Access control, Logical Access Controls
76  cards
Chapter 3 mod 2
Define physical access controls a...,
What is the primary purpose of ph...,
How do physical access controls c...
30  cards
Chapter 3 mod 3
What is the fundamental differenc...,
How do logical access controls op...,
Name three types of logical acces...
39  cards
Chapter 4 Mod 1: Understanding Computer Networking
Understanding Computer Networking, Network Threats and attacks, Understanding Network Security Infrastructure
155  cards
Chapter 4 Mod2: Understand Network cyber threats and attacks
What is the goal of an attack inv...,
What types of logical identificat...,
What characterizes an attack that...
72  cards
Chater 4 Mod3: Understanding Network Security Infrastructure
What are the two primary options ...,
What are some critical components...,
Why is the protection of the phys...
147  cards
Chapter 5 Mod 1: Understand Data Security
Data Security, System Handling, Best Practice Security Policies, Security Awareness Training
68  cards
Chapter 5 Mod 2: understand system handling
What is configuration management ...,
What is the significance of basel...,
How does a security baseline cont...
36  cards
Chapter 5 mod 3: understand best practice security policies
What does the data handling polic...,
How does classifying credit card ...,
What should a password policy des...
61  cards
Chapter 5 mod 4: understand security awareness training
What is the primary goal of aware...,
How does awareness training contr...,
Why is it important for awareness...
41  cards
Glossary
Adequate security,
Administrative controls,
Adverse events
7  cards
Domain 1 thor
What is information security,
What is it security,
What is cybersecurity
5  cards
Domain 4 thor
What is simplex,
What is half duplex,
What is full duplex
25  cards

More about
cc

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Amie Gray's CC flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards