This class was created by Brainscape user Jonathan Russial. Visit their profile to learn more about the creator.

Decks in this class (20)

Chapter 1 - General Concepts
What are the three components of ...,
What does confidentiality protect...,
What are some examples of confide...
16  cards
Chapter 2 - Threat Landscape
What are the four characteristics...,
Unskilled attackers,
Hacktivist
18  cards
Chapter 3 - Malicious Code
Malware,
Ransomware,
Trojans
10  cards
Chapter 4 - Social Engineering and Password Attacks
Social engineering,
What are some of the most common ...,
Phishing
19  cards
Chapter 5 - Program Management and Oversight
Vulnerability management,
Vulnerability scanning,
Asset inventory
32  cards
Chapter 6 - Application Security
Software development life cycle sdlc,
What are the main steps of the so...,
What are the four most common typ...
34  cards
Chapter 7 - Cryptography and the PKI
Cryptography,
Cipher,
Substitution cipher
52  cards
Chapter 8 - Identity and Access Management
Identity,
What are some of the common ways ...,
Single sign on sso
34  cards
Chapter 9 - Resilience and Physical Security
Continuity of operations,
Geographic dispersion,
Load balancing
27  cards
Chapter 10 - Cloud and Virtualization Security
Cloud computing,
Multitenancy,
Scalability
39  cards
Chapter 11 - Endpoint Security
What are some of the most common ...,
Firmware,
End of life legacy hardware
41  cards
Chapter 12 - Network Security
Defense in depth,
Attack surface,
Security zone
61  cards
Chapter 13 - Wireless and Mobile Security
Cellular,
Bluetooth,
Radio frequency identification rfid
23  cards
Chapter 14 - Monitoring and Incident Response
Incident,
Event,
What are the six steps of the inc...
27  cards
Chapter 15 - Digital Forensics
Legal hold,
E discovery,
Order of volatility
13  cards
Chapter 16 - Security Governance and Compliance
Governance,
Board of directors,
Independent directors
43  cards
Chapter 17 - Risk Management and Privacy
Enterprise risk management erm,
Threats,
Vulnerabilities
34  cards
Important Terms/Topics
Data subjects,
Data controllers owners,
Data custodians
31  cards
Dion Review
Isolation,
Data controller,
Exposure factor
67  cards
Dion Review 2
What is the term for a type of op...,
Kisha a security official is impl...,
What are some data categories tha...
29  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jonathan Russial's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Practice exams
  • 38 decks
  • 2776 flashcards
  • 184 learners
Decks: Professor Messer Practice Questions, Comptia Practice Questions, Comptia Review Questions, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 236 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards