This class was created by Brainscape user Muhammad Usman Chaudhry.

By:

Decks in this class (16)

About Us/ Credits
Welcome 1,
What s this about 2,
Why is it free 3
9  cards
A1 Cyber Security Threats
What is an internal threat 1,
Examples of internal threats 2,
Employee sabotage 3
35  cards
A2 System Vulnerabilities
What is a system vulnerability 1,
Why is understanding vulnerabilit...,
Network vulnerabilities 3
35  cards
A3 Legal Responsibilities
Purpose of cybersecurity laws 1,
What is the data protection act 1...,
What replaced the data protection...
30  cards
A4 Physical Security Methods
What are physical security measur...,
Purpose of physical security 2,
Example of physical threat 3
25  cards
A5 Software & Hardware Security Measures
Purpose of software and hardware ...,
Antivirus software 2,
Firewall 3
20  cards
B1 Network Types
What is a network 1,
What is a lan local area network 2,
Advantages of lan 3
36  cards
B2 Network Components
Main categories of network compon...,
Examples of hardware components 2,
What are end user devices 3
27  cards
B3 Networking Infrastructure Services and Resources
What is tcp ip 1,
Tcp ip layers 2,
Transport layer tcp 3
29  cards
C1 Computer System Vulnerabilities
What is the goal of a cybersecuri...,
Why assess vulnerabilities regula...,
What are tools and methods for as...
35  cards
C2 Risk Severity for each Threat
What is a risk in cybersecurity 1,
Why is risk assessment important 2,
What is risk severity 3
38  cards
C3 A Cybersecurity Plan for a System
What is a cybersecurity plan 1,
Purpose of a cybersecurity plan 2,
Key components of a cybersecurity...
24  cards
D1 Internal Policies
What are internal security polici...,
Why are internal policies importa...,
Who creates internal policies 3
49  cards
D2 External Service Providers
What are external service provide...,
Why do businesses use external pr...,
Examples of external service prov...
40  cards
E1 Forensic Collection of Evidence
What is digital forensics 1,
Purpose of digital forensics 2,
What is forensic collection 3
28  cards
E2 Systematic Forensic Analysis of a Suspect System
What is systematic forensic analy...,
Purpose of forensic analysis 2,
What is the first step in analysis 3
30  cards

More about
IT Unit 11

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....