Learn Information Security Management
Study Information Security Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Criminology
Criminology
By: Chris pearce
Chapter 1 - Interrogating crime BLOCK 1, BOOK 1, Chapter 2 - Global cities, segregation and transgression BLOCK 1, BOOK 1, Chapter 3: Cybercrime: globalisation, power and harm in the new media age. BLOCK 1, BOOK 1 ...16Decks438Flashcards16Learners -
ICT Year 2
ICT Year 2
By: Michał Malewicz
Topic 1 Networks, Topic 2 The Internet, Topic 3 Human-computer interface ...9Decks103Flashcards2Learners -
Dispute Resolution
Dispute Resolution
By: Sim S
Overview of a Civil Claim, Civil Court System, Introduction to CPR and Overriding Objective ...75Decks805Flashcards2Learners -
OSFA_Specialist
OSFA_Specialist
By: Daniel Egan
Modes of inheritance, Types of variants, NGS chemistry ...29Decks269Flashcards1Learner -
600s Operations
600s Operations
By: Kevin Walker
600-01 Response Management, 600-02 Beat Accountability, 600-03 General Broadcasts ...39Decks506Flashcards1Learner -
CIPP/US
CIPP/US
By: Sarah McD
I-A: Introduction to Privacy, I-B: Structure of U.S. Law, I-C: Enforcement of Privacy & Data Security Laws ...4Decks209Flashcards1Learner -
02 Play it safe: Manage Security Risks
02 Play it safe: Manage Security Risks
By: Amreek Paul
WK 1 Security Domains, WK 1 NIST's Risk Management Framework, WK 2 More about Frameworks and Controls ...10Decks129Flashcards1Learner -
Information Assurance Midterms
Information Assurance Midterms
By: Lordvic Gabas
Information Security, Information Security Risk Management2Decks145Flashcards1Learner -
Computing
Computing
By: ELZER ASFAW
OS Functions, OS Functions - Linux, Comparing mobile different OS ...26Decks176Flashcards2Learners -
ICT A2 Ch4 Applications of ICT
ICT A2 Ch4 Applications of ICT
By: Darren Nott
4a Software-Based Training ***, 4b Limitations of ICT ***, 4c Networks at Home and Work ...11Decks29Flashcards6Learners -
Station Officer = Cam's
Station Officer = Cam's
By: Cameron McPherson
Workplace Behaviour Policy, ORG 109 - Work Health & Safety Incident Management, ORG 133 - WorkCover ...67Decks433Flashcards4Learners -
(CISSP) Domain 2: Asset Security
(CISSP) Domain 2: Asset Security
By: Trevor Murphy
2.1 Identify and Classify Information and Assets, 2.2 Establish Information and Asset Handling Requirements, 2.3 Provision Resources Securely ...6Decks110Flashcards1Learner -
MIS
MIS
By: Luca Ben
SESSION 2 - Mastering the three worlds of information technology, SESSION 3 - Info systems for business and beyond, SESSION 3 - Humans vs. Horses ...32Decks192Flashcards4Learners -
CIPP/US 2022
CIPP/US 2022
By: Serafina Fiornascente
I. Intro to Privacy Landscape (Section A: General Introduction to Privacy Concepts), I. Intro to the Privacy Landscape (Section B: Structure of U.S. Law), I. Intro to Privacy Landscape (Section C: Enforcement of Privacy and Data Security Laws) ...5Decks20Flashcards2Learners -
Woods -zOrders
Woods -zOrders
By: g wood
573B- Public Information Unit Order, 475B- Copy Center Unit Order, 474B- Supply And Mail Unit Order ...69Decks1,289Flashcards3Learners -
CS1032 - Lecture Notes
CS1032 - Lecture Notes
By: Jonathan Li
U1 - Introduction to Business, U2 - Ch.5 - Database Structures, U3 - Ch.1 - Data Integration and Information ...12Decks99Flashcards4Learners -
CCSK Certification
CCSK Certification
By: Kal Krishnan
Domain 1 - Cloud Computing Concepts and Architecture, Domain 2 - Governance & Risk Management, Domain 3 - Legal Issues, Contracts and Electronic Discovery ...13Decks90Flashcards3Learners -
CFA
CFA
By: john jagerson
Quantitative Analysis, Corporate Finance: Capital Budgeting, Ethics ...36Decks288Flashcards6Learners -
CompTIA Security+
CompTIA Security+
By: Beth Hosek
1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors ...61Decks103Flashcards3Learners -
Cysa+
Cysa+
By: Faisal Iqbal
Understandinf Vulnerability Response, Handling, And Management, Exploring Threat Intelligence and Threat Hunting Concepts, Explain Important System and Network Architecture Concepts ...15Decks195Flashcards1Learner -
Admin theory
Admin theory
By: Sofia Rashid
HEALTH AND SAFTEY, Customer Service, Security of people, property and information ...5Decks30Flashcards1Learner -
05 Assets, Threats, and Vulnerabilities
05 Assets, Threats, and Vulnerabilities
By: Amreek Paul
MD1 Understand risks, threats, and vulnerabilities, MD1 Common classification requirements, MD1 Digital and Physical Assets: Assets in a digital world ...50Decks337Flashcards2Learners -
Chapter 3.1 - 3.3 The Regulation Of Financial Markets and Institutions
Chapter 3.1 - 3.3 The Regulation Of Financial Markets and Institutions
By: Vemula Shravya
EU: Harmonisation Of Financial Services, EU: The European Securities And Markets Authority, EU: The Markets In Financial Instruments Directive ...28Decks238Flashcards1Learner -
INF1505
INF1505
By: GEORGINA BOSHIELO
AN INTRODUCTION TO NFORMATION SYSTEM, INFORMATION SYSTEMS IN ORGANIZATIONS, HARDWARE : INPUT , PROCESSING , OUTPUT NAD STORAGE DEVICES ...13Decks17Flashcards2Learners -
2015 Army Study Guide
2015 Army Study Guide
By: Julian Joseph
ADP 1 / ADRP 1 - The Army, ADP 1-02 / ADRP 1-02 - Operational Terms and Military Symbols, ADP 2-0 / ADRP 2-0 - Intelligence ...63Decks272Flashcards30Learners -
IT
IT
By: Brydie Cox
Sercurity - Information Management, Security 22Decks49Flashcards1Learner -
SRSI
SRSI
By: Miguel Teodoro
Introduction, Legal Ethical, Risk Management ...6Decks58Flashcards1Learner -
BIS BISS
BIS BISS
By: Selina Wong
1.1 Security Management, Corporate Security, Risks & Responsibilities, 1.2 Risk assessment approaches & processes, 2. Legal, Social & Ethical Aspects: information security & privacy ...17Decks153Flashcards1Learner -
Departmental Bulletins
Departmental Bulletins
By: Manny Aroz
22-01 LAFD Apparatus Backing Policy, 22-02 High Visibility Vest, 22-03 Maintaining a Valid Driver License ...35Decks293Flashcards1Learner -
ITIL 4 Foundations (Personal)
ITIL 4 Foundations (Personal)
By: Phillip Burk
Service, Organizations and Roles, Value in ITSM ...40Decks103Flashcards3Learners