Learn Information Security Management
Study Information Security Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
INFO SYSTEMS (Drews)
INFO SYSTEMS (Drews)
By: Mats Beckmann
Chapter 1: Information Systems in Global Businesses Today, Chapter 2: Global E-business and Collaboration, Chapter 3: IS, Organizations and Strategy ...12Decks195Flashcards1Learner -
PCS CISM
PCS CISM
By: Paul Simmons
Domain 1 - Information Security Governance, Domain 2 - Risk Management, test questions3Decks47Flashcards1Learner -
AQA A-Level History: The Tudors
AQA A-Level History: The Tudors
By: Olivia Middlemass
1.1 Henry VII - Securing the Throne, 1.2 Henry VII - Foreign Policy, 1.3 Henry VII - Control of Finance ...27Decks484Flashcards2Learners -
Higher Admin
Higher Admin
By: Kayleigh Mealing
Time + Task Managment, Security And Confidentiality Of Information, Organisational Communication ...9Decks44Flashcards1Learner -
Computing
Computing
By: ELZER ASFAW
OS Functions, OS Functions - Linux, Comparing mobile different OS ...26Decks176Flashcards2Learners -
BISCI - DCDC
BISCI - DCDC
By: Cody Jackson
Chapter 01: Data Center Concepts, Chapter 02: Project Planning, Chapter 03: Project Implementation ...18Decks173Flashcards1Learner -
Criminology
Criminology
By: Chris pearce
Chapter 1 - Interrogating crime BLOCK 1, BOOK 1, Chapter 2 - Global cities, segregation and transgression BLOCK 1, BOOK 1, Chapter 3: Cybercrime: globalisation, power and harm in the new media age. BLOCK 1, BOOK 1 ...16Decks438Flashcards14Learners -
AIS
AIS
By: Frederik Jakobsen
CHAPTER 1 Accounting Information Systems: An Overview, CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems, CHAPTER 3 Systems Documentation Techniques ...19Decks189Flashcards22Learners -
ICT Year 2
ICT Year 2
By: Michał Malewicz
Topic 1 Networks, Topic 2 The Internet, Topic 3 Human-computer interface ...9Decks103Flashcards2Learners -
OSFA_Specialist
OSFA_Specialist
By: Daniel Egan
Modes of inheritance, Types of variants, NGS chemistry ...29Decks269Flashcards1Learner -
Information Assurance Midterms
Information Assurance Midterms
By: Lordvic Gabas
Information Security, Information Security Risk Management2Decks145Flashcards1Learner -
CMA Exam Part 1
CMA Exam Part 1
By: Aleisha Jackson
P1.A.1.1 Financial Statements, P1.A.1.2 Integrated Reporting, P1.A.2.1 Asset Valuation - Accounts Receivable ...35Decks339Flashcards108Learners -
cct225: Information Systems
cct225: Information Systems
By: Sarah Ohene-manu
Chapter 1: Management Information Systems: Business Driven MIS, Chapter 2: Decisions and Processes: Value Driven Business, Chapter 3: E-business: Electronic Business Value ...8Decks99Flashcards2Learners -
02 Play it safe: Manage Security Risks
02 Play it safe: Manage Security Risks
By: Amreek Paul
WK 1 Security Domains, WK 1 NIST's Risk Management Framework, WK 2 More about Frameworks and Controls ...10Decks129Flashcards1Learner -
600s Operations
600s Operations
By: Kevin Walker
600-01 Response Management, 600-02 Beat Accountability, 600-03 General Broadcasts ...39Decks506Flashcards1Learner -
Woods -zOrders
Woods -zOrders
By: g wood
573B- Public Information Unit Order, 475B- Copy Center Unit Order, 474B- Supply And Mail Unit Order ...69Decks1,289Flashcards3Learners -
MIS
MIS
By: Luca Hallet
SESSION 2 - Mastering the three worlds of information technology, SESSION 3 - Info systems for business and beyond, SESSION 3 - Humans vs. Horses ...32Decks192Flashcards4Learners -
CompTIA Security+
CompTIA Security+
By: Beth Hosek
1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors ...61Decks103Flashcards3Learners -
CS1032 - Lecture Notes
CS1032 - Lecture Notes
By: Jonathan Li
U1 - Introduction to Business, U2 - Ch.5 - Database Structures, U3 - Ch.1 - Data Integration and Information ...12Decks99Flashcards4Learners -
Cysa+
Cysa+
By: Faisal Iqbal
Understandinf Vulnerability Response, Handling, And Management, Exploring Threat Intelligence and Threat Hunting Concepts, Explain Important System and Network Architecture Concepts ...15Decks195Flashcards1Learner -
CFA
CFA
By: john jagerson
Quantitative Analysis, Corporate Finance: Capital Budgeting, Ethics ...36Decks288Flashcards6Learners -
CIPP/US 2022
CIPP/US 2022
By: Serafina Fiornascente
I. Intro to Privacy Landscape (Section A: General Introduction to Privacy Concepts), I. Intro to the Privacy Landscape (Section B: Structure of U.S. Law), I. Intro to Privacy Landscape (Section C: Enforcement of Privacy and Data Security Laws) ...5Decks20Flashcards2Learners -
CCSK Certification
CCSK Certification
By: Kal Krishnan
Domain 1 - Cloud Computing Concepts and Architecture, Domain 2 - Governance & Risk Management, Domain 3 - Legal Issues, Contracts and Electronic Discovery ...13Decks90Flashcards3Learners -
05 Assets, Threats, and Vulnerabilities
05 Assets, Threats, and Vulnerabilities
By: Amreek Paul
MD1 Understand risks, threats, and vulnerabilities, MD1 Common classification requirements, MD1 Digital and Physical Assets: Assets in a digital world ...50Decks337Flashcards2Learners -
IT
IT
By: Brydie Cox
Sercurity - Information Management, Security 22Decks49Flashcards1Learner -
SRSI
SRSI
By: Miguel Teodoro
Introduction, Legal Ethical, Risk Management ...6Decks58Flashcards1Learner -
INF1505
INF1505
By: GEORGINA BOSHIELO
AN INTRODUCTION TO NFORMATION SYSTEM, INFORMATION SYSTEMS IN ORGANIZATIONS, HARDWARE : INPUT , PROCESSING , OUTPUT NAD STORAGE DEVICES ...13Decks17Flashcards2Learners -
RBI Act
RBI Act
By: Tushar Uttekar
Chapter I - PRELIMINARY, Chapter II - INCORPORATION, CAPITAL, MANAGEMENT, BUSINESS, Chapter III CENTRAL BANKING FUNCTIONS ...11Decks116Flashcards1Learner -
BIS BISS
BIS BISS
By: Selina Wong
1.1 Security Management, Corporate Security, Risks & Responsibilities, 1.2 Risk assessment approaches & processes, 2. Legal, Social & Ethical Aspects: information security & privacy ...17Decks153Flashcards1Learner -
2015 Army Study Guide
2015 Army Study Guide
By: Julian Joseph
ADP 1 / ADRP 1 - The Army, ADP 1-02 / ADRP 1-02 - Operational Terms and Military Symbols, ADP 2-0 / ADRP 2-0 - Intelligence ...63Decks272Flashcards29Learners