Learn Information Security Management
Study Information Security Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Accounting Information System
Accounting Information System
By: Diep Khac
1. Accounting Information System, 2. Overview of Transaction Processing and Enterprise Resource Planing Systems., 3. System Documentation Techniques ...19Decks191Flashcards16Learners -
IT Infrastruktur ITIL Practices können mit hintergrund
IT Infrastruktur ITIL Practices können mit hintergrund
By: Firat Özkök
03 Information Security Management, 06 Organizational Change Management (19 ü 5 Seiten), 15. Availability Management (3 10 Seiten) ...5Decks42Flashcards1Learner -
Sgt Study GUI
Sgt Study GUI
By: Steve Rista
5.1 Correspondence Manual, 9.1 Employee Relations, 9.2 Substance Manual ...42Decks728Flashcards5Learners -
ISO 27001 Foundational
ISO 27001 Foundational
By: S D
Module 1 - The Basics, Module 2 - Documentation and management systems, Module 3 - Information Security ...5Decks64Flashcards3Learners -
CIPP-US = 981 Cards
CIPP-US = 981 Cards
By: Ricardo N.
Structure of US Law, Enforcement of U.S. Privacy and Security Laws, Information Management from a U.S. Perspective ...14Decks981Flashcards4Learners -
cct225: Information Systems
cct225: Information Systems
By: Sarah Ohene-manu
Chapter 1: Management Information Systems: Business Driven MIS, Chapter 2: Decisions and Processes: Value Driven Business, Chapter 3: E-business: Electronic Business Value ...8Decks99Flashcards7Learners -
Security Blue - Security Information & Event Monitoring (SIEM)
Security Blue - Security Information & Event Monitoring (SIEM)
By: ola sijuwola
Security Information Management, Security Event Management, SIEM ...21Decks181Flashcards7Learners -
CPP GUIDE Q&A
CPP GUIDE Q&A
By: Robert Harkort
CHAPTER 3: INVESTIGATION, CHAPTER 4: PROTECTION OF SENSITIVE INFORMATION, CHAPTER 5: SUBSTANCE ABUSE ...7Decks391Flashcards2Learners -
CA 8
CA 8
By: Jake P
8.1.1 Maintaining privacy and confidentiality of an organisation's information and that of stakeholders, 8.1.2 The potential impact of failing to maintain privacy and confidentiality, 8.1.3 Potential technical threats and vulnerabilities to systems, data and information ...7Decks61Flashcards15Learners -
ICT A2
ICT A2
By: Emelda Braimoh
4.3.3 Human Computer Interface (HCI), 4.3.4 Working with ICT, 4.3.5 ICT Security Policies ...9Decks109Flashcards5Learners -
Information Management
Information Management
By: Adam Greaney
Information management, Cyber security issues + defence mechanisms, Main people/organisations responsible for cyber attacks ...6Decks58Flashcards3Learners -
Operational Risk
Operational Risk
By: Joey Rigden
Chapter 1: Risk Identification Tools, Chapter 2: Scenario Identification Process, Chapter 3: Risk Definition and Taxonomy ...20Decks437Flashcards1Learner -
General Orders 600's
General Orders 600's
By: Cameron King
600-01 Response Management, 600-02 Beat Accountability, 600-03 General Broadcasts ...39Decks885Flashcards4Learners -
CompTIA
CompTIA
By: Caitlin Ricks
Computer Memory Measurements, 1.1 Notational Systems, 1.2 Data Types and Characteristics ...23Decks401Flashcards3Learners -
CISSP CBK
CISSP CBK
By: Cliff Barnes
General Concepts, Information Security Governance, Risk Management ...4Decks137Flashcards2Learners -
PHRM 161
PHRM 161
By: Sarah L
Week 1: Health Informatics Concepts, Week 2: Health Information Systems, Privacy, Security, and Ethical Considerations, Week 3: EHR I, Data Sovereignty ...12Decks362Flashcards2Learners -
BCOR 1015 Review
BCOR 1015 Review
By: Chris Gerlacher
Adding value and major types of businesses, 3 Steps From Consumer To Business Professional, 5 Major Environments Businesses Operate In ...53Decks587Flashcards191Learners -
MGMT 250: Information Technology Management
MGMT 250: Information Technology Management
By: Kale Blakely
Chapter 1: The Importance of MIS, Chapter 10: Acquiring Information Systems Through Projects, Chapter 11: Structure, Governance, and Ethics ...7Decks345Flashcards1Learner -
Information and Data
Information and Data
By: Lilly Adams
Types of Information and Data protected by Legislation, How Businesses manage Information and Data and why these Methods are used, Rights of Individuals regarding their own Information and Data ...7Decks105Flashcards2Learners -
CIPP/US
CIPP/US
By: Sarah McD
I-A: Introduction to Privacy, I-B: Structure of U.S. Law, I-C: Enforcement of Privacy & Data Security Laws ...5Decks464Flashcards1Learner -
SC-900
SC-900
By: Elizabeth Sanchez
Describe Security and Compliance Concepts, Describe Identity Concepts, Describe the function and identity types of Microsoft Entra ID ...15Decks102Flashcards3Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards74Learners -
IT auditing Job Interview
IT auditing Job Interview
By: Host Mom
Risk Management, Detailed Anwsers, IT Auditing - Information Security Control ...33Decks442Flashcards9Learners -
IMKM
IMKM
By: Lewon Simonian
1 - Information & Knowledge Management: Fundamentals, 2 Strategy & Information Management I (Business IT Alignment), 3 Strategy & Information Management II (IT-enabled Strategies) ...11Decks141Flashcards2Learners -
Security+
Security+
By: Jerry Pacheco
Security+ 1.1 Prof. Messer, Security+ 1.2 Prof. Messer, CompTIA Security+ TB 3.0 Security Tech And Tools ...10Decks139Flashcards3Learners -
MIS2
MIS2
By: roel hurkmans
1 - H1 managing in the digital world, 2- H3 information technologie & systemen, 3- competitive advantage & E-commerce (H2&4) ...7Decks77Flashcards1Learner -
BEC
BEC
By: Abel Jay
B3-FINANCIAL MANAGEMENT-LEVERAGE, B3-FINANCIAL MANAGEMENT-WACC, B3-FINANCIAL MANAGEMENT-ASSET EFFECTIVENESS AND EFFICIENCY ...18Decks305Flashcards1Learner -
Introduction to business
Introduction to business
By: Henry Castillo
Types of Business Ownership, THE DYNAMIC BUSINESS ENVIRONMENT, Production ...19Decks318Flashcards2Learners -
Electronic Health Records Summer 2020
Electronic Health Records Summer 2020
By: Miarasa Steele
Unit 1: Introduction to Computers in Health Information Management, Unit 2: The History of EHRs, Unit 3: Components of the EHR ...6Decks153Flashcards2Learners -
Cyber security Introductory RG flashcards
Cyber security Introductory RG flashcards
By: aaron nehus
.01 RG Vocab introduction to cyber security, .02 RG Vocab Information Security & Risk Management, .03 RG Vocab network security ...8Decks292Flashcards1Learner