This class was created by Brainscape user Esther Opaogun.

By:

Decks in this class (16)

1. Learning Aim A - A1 Cyber Security Threats
What is an internal threat in cyb...,
List some examples of internal th...,
What can employees physically ste...
41  cards
1.Learning Aim A2 System Vulnerabilities
What is a system vulnerability 1,
List the different areas from whi...,
What are network vulnerabilities 3
25  cards
1.Learning aim B1 Network Types
What is a network 1,
What are the types of networks di...,
What is a local area network lan 3
52  cards
1.Learning Aim B2
What are end user devices 1,
What connectivity method do mobil...,
What is a significant feature of ...
28  cards
1.Learning Aim B3
What is a protocol in networking 1,
What are the two main protocols u...,
What are the four layers of the t...
46  cards
1.Learning Aim C1
What is a cybersecurity protectio...,
Who can perform vulnerability ass...,
What is the purpose of independen...
18  cards
1.Learning Aim C2
What is a risk in the context of ...,
Why is it important to assess ris...,
What are the measures for risk se...
17  cards
1.Learning Aim C3
What is the purpose of a cybersec...,
What types of risks are primarily...,
What are the key components of a ...
22  cards
2.Learning Aim A3
What is the primary purpose of th...,
What significant law replaced the...,
What is the maximum fine for brea...
22  cards
2. Learning Aim A4
What are the physical security me...,
True or false physical security m...,
What is the purpose of cctv in ph...
11  cards
2. Learning Aim A5
What are the two most important s...,
What is the purpose of anti virus...,
What are the two main detection t...
40  cards
2. Learning Aim C3
What is the purpose of a cybersec...,
What are the first three items to...,
What should be included in the ac...
11  cards
4.Learning Aim D1
What is the purpose of internal p...,
What does the plan do check act l...,
List the stages of the plan do ch...
35  cards
4. Learning Aim D2
What is an external service provi...,
What is the agreement between a s...,
Name three common functions provi...
9  cards
4. Learning Aim E1
What is digital forensics 1,
What is desktop forensics also kn...,
What is the first stage of perfor...
23  cards
4. Learning Aim E2
What is the importance of maintai...,
What can happen if evidence is no...,
Why is it important to have regul...
10  cards

More about
IT Unit 11

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

IT-Säkerhet
  • 12 decks
  • 1454 flashcards
  • 120 learners
Decks: Natverk, Linux, It Juridik, And more!
Year 11 Legal Studies Unit 1
  • 27 decks
  • 481 flashcards
  • 551 learners
Decks: Chapter 1a Social Cohesion, Chapter 1b Principles Of Justice, Chapter 1c Characteristics Of Laws, And more!
Unit 6
  • 32 decks
  • 1086 flashcards
  • 11 learners
Decks: Molecular Cellular Princ Med Hemoglobin, Molecular Cellular Princ Med Heme Synthe, Microscopic Anatomy Blood Ira Ames Sana, And more!