This class was created by Brainscape user Selina Wong. Visit their profile to learn more about the creator.

Decks in this class (17)

1.1 Security Management, Corporate Security, Risks & Responsibilities
What is involved in the context o...,
Describe the elements of the secu...,
What is involved in the context o...
8  cards
1.2 Risk assessment approaches & processes
What are the different risk asses...,
What are the different types of q...,
Describe the different types of q...
7  cards
2. Legal, Social & Ethical Aspects: information security & privacy
What are the different categories...,
Describe the possible different t...,
Describe the social ethical aspects
7  cards
3. Security Standards & Security Management
What should information security ...,
What are the problems associated ...,
What are the formal security stan...
8  cards
4. Network Security Fundamentals
Define a firewall,
What are the different firewall t...,
Describe the different features i...
13  cards
5.1 Database Security
What is database security,
What are the database security ob...,
What types of data can be stolen ...
10  cards
5.2 Database Security Countermeasures P1
What are the different types of c...,
How does authentication work,
What are the alternatives to pass...
13  cards
5.3 Database Security Countermeasures P2
What is sql injection,
How is sql injection done,
How to avoid sql injection as a t...
10  cards
6.1 Mobile Security (Security Management issues)
Describe the capabilities of a mo...,
What are the possible peculiar pe...,
What are the possible peculiar pe...
9  cards
6.2 Extra Issues of Mobile Security
Describe the extra issues of mobi...,
Describe the extra issues of mobi...,
Describe the extra issues of mobi...
8  cards
6.3 Extraction Levels
What are the different extraction...,
Describe what is level 1 manual e...,
What are the pros of level 1 manu...
21  cards
6.4 Extraction Retrieval
What are the different places whe...,
Describe what data can and can t ...,
What type of data can be retrieve...
3  cards
7.1 Operating Systems Security P1
Define what is os hardening host ...,
What are the 5 steps suggested by...,
What are the problems that come w...
7  cards
7.2 Operating System Security P2
What is involved in cloud computi...,
What are the benefits of cloud,
What are potential challenges for...
5  cards
10.1 Smart Cities
What are smart homes,
What does smart stand for in the ...,
What are the characteristics of s...
9  cards
10.2 Smart City Delivery
What are the different elements r...,
What are the characteristics of a...,
What are the characteristics of s...
8  cards
11 Internal Audits
What is an audit,
What is an internal audit,
What are the core principals of a...
7  cards

More about
BIS BISS

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Selina Wong's BIS BISS flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards