This class was created by Brainscape user Kinzi Catalano. Visit their profile to learn more about the creator.

Decks in this class (54)

Risk Management Continue
Fail open,
Fail course,
Fail soft
5  cards
Informationn Security And Risk Management
Risk management,
Risk assessment techniques,
Nist
41  cards
Security Management
Security management,
Security executive oversight,
Security governance
9  cards
Security Roles and Responsibilities
Roles and responsibilities,
Ownership of assets,
Access to assets
7  cards
Data Classification and Protection
Data classification,
Sensitivity levels,
Information labelling
8  cards
Personnel Security
Hiring practices and procedures,
Work practices,
Security education training and a...
3  cards
Cryptography
Cryptography,
Plaintext,
Ciphertext
33  cards
Governance and compliance
Governance,
It security management,
Data governance
21  cards
Governance
Ids ips monitoring,
Ips monitoring
2  cards
Ethics
Utilitarian ethics,
The rights approach,
The common good approach
12  cards
Security Management Framework
Iso iec 27000,
Isms,
Iso 27000 twelve domains
35  cards
Application of Cryptography
Uses for cryptography,
File encryption,
Disk encryption
7  cards
Management of Cryptography
Key management,
Key creation,
Key protection and custody
13  cards
Encryption Alternatives
Steganography,
Watermarking
2  cards
Network Security Testing
Vulnerability scanners,
What types of vulnerabilities do ...,
What are some commonly used vulne...
11  cards
Security Automation
Soar,
Siem
2  cards
Chapter 10 - Wired Telecom Technologies
Wired telecom technologies,
Ds 1,
Sonet
13  cards
Chapter 10 - Network Technologies
Ethernet,
Ethernet frame layout,
Header
11  cards
Chaper 10 - Network Topologies
Network topologies,
Bus,
Ring
5  cards
Chapter 10 - Ethernet Devices
Hub,
Bridge,
Repeater
7  cards
Chapter 10 - Wireless Network Technologies
Wifi,
Bluetooth,
Irda
5  cards
Chapter 10 - Network Protocols
Network protocols,
The osi network model,
The layers of the osi model
24  cards
Chapter 10 - Network-Based Threats, Attacks and Vulnerabilities
Threats,
Attacks,
Dos
15  cards
Network Security Testing Tools
Nmap zenmap,
Superscan,
Siem security information event m...
8  cards
Penetration Testing
Penetration testing,
Black box testing,
Gray box
9  cards
Information Sources
Sans,
Mitre,
First
5  cards
Threat Intelligence services
Threat intelligence services,
Cisco talos,
Fireeye
11  cards
Network and Server Vulnerability
Cvss,
Isms,
Network profiling
11  cards
Common Vulnerability Scoring System
Cvss,
Cvss 30,
First
9  cards
Secure Device Management
Risk management process,
T v pair,
Risk avoidance
22  cards
Enpoint Vulnerability Quiz
In profiling a server what define...,
In profiling a server what define...,
When a network baseline is being ...
11  cards
Module 5 - Risk Management
Risk management,
Risk,
Risk impact
21  cards
Module 5 - Risk Assessment
Threat,
Threat vector,
Threat source types
10  cards
Module 5 - Security Control
Security controls,
Administrative controls,
Technical controls
11  cards
Chapter 2 - Access Control
Access control,
Identification,
Authentication
11  cards
Chapter 2 - Access Control Technologies and Methods
Access control technologies and m...,
Single sign on,
Reduced sign on
8  cards
Chapter 2 - Access Control Attacks
Access control attacks,
Buffer overflow,
Script injection
15  cards
Chapter 2 - Access Control Processes
Access control processes,
Access request and provisioning,
Personnel internal transfer
6  cards
Chapter 2 - Access Control Concepts
Separation of duties,
Least privilege,
Types of controls
13  cards
Chapter 2 - Testing Access Controls
Testing access controls,
Vulnerability scanning,
Penetration testing
4  cards
Module 6 - Digital Forensics
Digital forensics,
Private investigations,
Data breach involving patient inf...
26  cards
Module 6 - The Cyber Kill Chain & Diamond Model
The cyber kill chain,
The 7 steps of the cyber kill chain,
Reconnaissance
21  cards
Module 6 - Incident Response
Incident response,
Nist 800 61r2,
Csirc
17  cards
Module 6 - Disaster Recovery
1  cards
Chapter 3 - Operating Systems
Operating system,
Kernel,
Device drivers
12  cards
Chapter 3 - Software Models and Technologies
Software models,
Object oriented programming,
Structured languages
7  cards
Chapter 3 - Threats in Software Environments
Software attack approaches,
Buffer overflow,
Malicious software
23  cards
Chapter 3 - Threats in Software Continued
Input attacks,
Object reuse,
Mobile code
6  cards
Chapter 3 - Security in the Software Development Life Cycle
The software development life cyc...,
Security in the conceptual stage,
Security application requirements...
7  cards
Chapter 3 - Application Environment and Security Controls
Application environment and secur...,
Authentication,
Authorisation
5  cards
Chapter 4 - Business Continuity and Disaster Recovery Planning
How disasters affect businesses,
How bcp and drp support data secu...,
What are the differences between ...
4  cards
Chapter 9 - Security Concepts
Confidentiality,
Integrity,
Availability
16  cards
Chapter 9 - Information Systems Evaluation Models
Common criteria,
Tcsec,
Tni
7  cards
Chapter 9 - Certification and Accreditation
Certification,
Certficia,
The 6 standards of certification ...
5  cards

More about
INFOSYS 727

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kinzi Catalano's INFOSYS 727 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Infosys prep
  • 4 decks
  • 96 flashcards
  • 2 learners
Decks: Basic Programming, Sql, Personal, And more!
Info Sys 434
  • 1 decks
  • 83 flashcards
  • 1 learners
Decks: Week 1, And more!
InfoSys
  • 1 decks
  • 96 flashcards
  • 1 learners
Decks: Final, And more!
InfoSys Interview
  • 1 decks
  • 64 flashcards
  • 2 learners
Decks: Endgame, And more!
Make Flashcards