Learn Information Security Policy
Study Information Security Policy using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
IS0001-03 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document Procedures35Decks184Flashcards28Learners -
ITC EXAM 2019
ITC EXAM 2019
By: Kj Roberge
ACP 121(I), COMMUNICATION INSTRUCTORS GENERAL, ACP 128 SUPP-1, ALLIED TELECOMMUNICATIONS RECORD SYSTEM (ALTERS) OPERATING PROCEDURES, CJCSM 6510.01B, CYBER INCIDENT HANDLING PROGRAM18Decks1,306Flashcards155Learners -
My Cards
My Cards
By: Cordell Gilmer
Payment Systems, Fundamentals Of Risk Management, Payments Risk Policy & Governance13Decks564Flashcards3Learners -
AT1
AT1
By: amanda thurlow
NAMP CH. 1 (2018), NAMP CH.10 (2018), Appendix E (2018)31Decks905Flashcards13Learners -
N10-008
N10-008
By: Jonathan Maner
Ports and Protocols, Information I Think is Worth Knowing, Cabling21Decks532Flashcards3Learners -
IT Management
IT Management
By: Jan Svrčina
Security Policies and Governance, Risk Management, Security Controls10Decks333Flashcards2Learners -
05. CISM - Chapter 5 - Information Security Program Development
05. CISM - Chapter 5 - Information Security Program Development
By: C MC
01. Information Security Program Resources, 01a. Information Security Technologies, 02. Information Asset Identification and Classification8Decks221Flashcards2Learners -
CRIMINAL INVESTIGATIONS
CRIMINAL INVESTIGATIONS
By: Devon Delacerda
Fundamentals of criminal investigations, Crime Science, Notes, Documenting and Reporting, Processing the Crime Scene19Decks673Flashcards13Learners -
SDC WJEC ICT A2
SDC WJEC ICT A2
By: Sheridan Nye
Topic 1: Networks, Topic 2: Internet, Topic 3: Human-Computer Interface (HCI)9Decks136Flashcards55Learners -
ICT A2
ICT A2
By: Candice Rogers
01 Networks, 02 The Internet, 03 Human-Computer Interface (HCI)9Decks501Flashcards6Learners -
Information Security
Information Security
By: Christian Edvall
L2 - Passwords and password cracking, F3 - Threats, L4 Malicious Software and Application Attacks9Decks184Flashcards6Learners -
AQA A-Level History: The Tudors
AQA A-Level History: The Tudors
By: Olivia Middlemass
1.1 Henry VII - Securing the Throne, 1.2 Henry VII - Foreign Policy, 1.3 Henry VII - Control of Finance27Decks484Flashcards2Learners -
JUNE
JUNE
By: Devansh Saxena
NTPC’s Biodiversity Policy, Denmark joins European Union’s defense pact, World Cities Summit63Decks1,009Flashcards1Learner -
ICT
ICT
By: Danielle Hillberg
DATABASE SYSTEMS, MANAGEMENT OF CHANGE, HCI11Decks196Flashcards3Learners -
SBM
SBM
By: Annie S
1 - Strategic Analysis, 2 - Strategic Option Generation & Choice, 3 Strategic Review and Implementation20Decks491Flashcards1Learner -
IF2 General Insurance Business
IF2 General Insurance Business
By: Na Na
Chapter 1- Motor Ins, Chapter 2, Chapter 3 - Package Policies13Decks71Flashcards40Learners -
Finance
Finance
By: Mara Kaufmann
L3: Taxes and Financial Distress, L4: Debt and Incentives, L1: Capital Budgeting5Decks154Flashcards1Learner -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS)35Decks506Flashcards3Learners -
CIPM 2.0 - IAPP
CIPM 2.0 - IAPP
By: Host Mom
Chapter 6 - Data Subjects Rights, 6.1 Privacy Notice and Policies, 6.2 Choice, Consent and Opt-Outs21Decks198Flashcards11Learners -
IT auditing Job Interview
IT auditing Job Interview
By: Host Mom
Risk Management, Detailed Anwsers, IT Auditing - Information Security Control33Decks442Flashcards5Learners -
ICT A2
ICT A2
By: Emelda Braimoh
4.3.3 Human Computer Interface (HCI), 4.3.4 Working with ICT, 4.3.5 ICT Security Policies9Decks109Flashcards5Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way)66Decks320Flashcards7Learners -
PPBM
PPBM
By: Cassie Williams
Code of Ethics and Rules of Conduct, FTO Program, Sworn Ranks, Titles, and Promotion Process41Decks539Flashcards3Learners -
IT auditing
IT auditing
By: Eric Banks
Risk Management, Detailed Anwsers, IT Auditing - Information Security Control13Decks88Flashcards6Learners -
Navy Public Affairs
Navy Public Affairs
By: Casey Scoular
NAVSO P-5728.20, Navy Public Affairs Guide, Navy Family Members, SECNAVINST 5870.4A, Copyright, SECNAV M-5510.36, Department of the Navy Information Security Program (2,4,6)6Decks256Flashcards7Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing42Decks171Flashcards74Learners -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management18Decks111Flashcards10Learners -
ICT A2
ICT A2
By: Claire Owens
Database Systems, Networks, Human Computer Interface - HCI21Decks106Flashcards3Learners -
Cryptography Week1 and Week2
Cryptography Week1 and Week2
By: Vemula Shravya
Information Security policies, General Cryptographic Schema, Mathematical formalisation of encryption and decryption6Decks63Flashcards1Learner -
ICT Year 2
ICT Year 2
By: Michał Malewicz
Topic 1 Networks, Topic 2 The Internet, Topic 3 Human-computer interface9Decks103Flashcards2Learners