Learn Digital Risk Management
Study Digital Risk Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(26)
Decks
Flashcards
Learners
-
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
2019 CPS
2019 CPS
By: Lisa Pinto
Screen Mgmt NB at Risk for Low BG, Iron requirements in first 2 y of life, Neuroprotection from acute brain injury in prems ...19Decks354Flashcards4Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies ...13Decks53Flashcards2Learners -
MIS
MIS
By: Lara Ziegler
Task 14 Sarker et al. Managing Employees Use of Mobile Technologies to Minimise work life balance impacts, ● ● Lessons for and from Digital Workplace Transformation in Times of Crisis - Sundermeier (2022), Artificial Intelligence in the real world – Harvard Business review ...32Decks618Flashcards10Learners -
IT1 SEP EXAM 2018
IT1 SEP EXAM 2018
By: Kj Roberge
ACP 135(F), COMMUNICATIONS INSTRUCTIONS DISTRESS AND RESCUE PROCEDURES, NAVEDTRA 14182A, NAVY ELECTRICITY AND ELECTRONICS TRAINING SERIES. MODULE 10-WAVE PROPAGATION, TRANSMISSION LINES, AND ANTENNAS, NAVEDTRA 14189A, NAVY ELECTRICITY AND ELECTRONICS TRAINING SERIES. MODULE-17 RADIO-FREQUENCY COMMUNICATIONS PRINCIPLES ...10Decks464Flashcards34Learners -
CPS 2019/2018
CPS 2019/2018
By: Lena Xiao
ADHD, Hypothermia, Hypoglycemia ...62Decks562Flashcards5Learners -
AOM
AOM
By: Iman Hussain
Industrial Logistics, Transport, Warehouse Management ...15Decks91Flashcards1Learner -
CTIF
CTIF
By: Dong Won Shin
Digital Innovation, International Governing Bodies, Setting The Scene ...15Decks184Flashcards1Learner -
3 - P1 - Management Accounting
3 - P1 - Management Accounting
By: Monique Lawrence
1.1 Management accounting and cost accounting, 1.2 Rationales for costing and understanding costs, 2.1 Absorption Costing & Marginal Costing ...24Decks369Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards2Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
MIS
MIS
By: Luca Hallet
SESSION 2 - Mastering the three worlds of information technology, SESSION 3 - Info systems for business and beyond, SESSION 3 - Humans vs. Horses ...32Decks192Flashcards4Learners -
SGreene
SGreene
By: Andrew Levine
1.1 Understand, Adhere, and Promote Professional Ethics, 1.2 Understand and Apply Security Concepts, 1-4.3 Privacy Principles ...126Decks622Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key Terms ...15Decks75Flashcards1Learner -
05 Assets, Threats, and Vulnerabilities
05 Assets, Threats, and Vulnerabilities
By: Amreek Paul
MD1 Understand risks, threats, and vulnerabilities, MD1 Common classification requirements, MD1 Digital and Physical Assets: Assets in a digital world ...50Decks337Flashcards2Learners -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
MAA215 Client Behaviour & Decision Making
MAA215 Client Behaviour & Decision Making
By: Pav Singh
Understanding Self & Others (Seminar 2), Risk Profiling (Seminar 7), Managing Conflict (Seminar 6) ...6Decks60Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner -
Digital Transformation
Digital Transformation
By: Amelie Kröner
History of Digital Progress, Definitions, Digital Transformation Framework ...7Decks42Flashcards1Learner -
CipherTechs
CipherTechs
By: Nicholas Leask
Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed Services ...5Decks25Flashcards1Learner -
Accounting
Accounting
By: Ida smith
BUS 405 Focus of the Final Project, BUS 430 Assignment 1 LensCrafters Case Study, BUS 475 Assignment 1 Social Performance of Organizations ...15Decks30Flashcards1Learner