Learn "Malicious Software"
Study "Malicious Software" using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
HIPPO
HIPPO
By: Media PRO
Acronyms, Key Terms, Phishing ...4Decks61Flashcards10Learners -
CS6035 InfoSec Exam 1
CS6035 InfoSec Exam 1
By: Kent Lorenz
P1L1 Security Mindset, P1L2 Software Security, P1L3 Operating Systems ...9Decks154Flashcards144Learners -
LIS 4774
LIS 4774
By: Tony Cazarez
Ch. 3, User Authentication, Midterm Prep ...9Decks309Flashcards62Learners -
Information Security
Information Security
By: Felix Hüneburg
Introduction, L2 - Securicy Policies, Social Engineering ...11Decks230Flashcards100Learners -
CYBERSECURITY FUNDAMENTALS
CYBERSECURITY FUNDAMENTALS
By: Shahed Shdifat
Malicious Software, Data Base, Web Security ...5Decks80Flashcards1Learner -
CS6035 - Intro to Info Sec
CS6035 - Intro to Info Sec
By: Michael Mroczka
P1L1: Security Mindset, P1L2: Software Security, P1L3: Operating Systems ...23Decks715Flashcards230Learners -
Product Overview Vocab
Product Overview Vocab
By: Shira Levy
Basic Computer Key Terms, Phishing, Malicious Software ...9Decks119Flashcards2Learners -
KB4 Onboarding Terms
KB4 Onboarding Terms
By: Derek Lawrence
Basic Computer Key Terms, Phishing, Malicious Software ...9Decks122Flashcards3Learners -
Internet Security
Internet Security
By: Edward Chancellor
Introduction, Symmetric Block Encryption, Stream Ciphers ...14Decks184Flashcards5Learners -
Cybersecurity
Cybersecurity
By: Jesus Barboza
Acronyms and Abbreviations, KnowBe4 - Free Tools, Compliance - Key Terms ...9Decks127Flashcards2Learners -
CISSP
CISSP
By: Rob McCauley
Introduction, Chapter 1: Access Control, Chapter 2: Access Control Attacks and Monitoring ...22Decks1,024Flashcards115Learners -
KnowBe4 Training
KnowBe4 Training
By: Jordan Flis
Basic Computer Key Terms, Tools of the Bad Guys, Malicious Software ...8Decks115Flashcards6Learners -
Information Security
Information Security
By: Christian Edvall
L2 - Passwords and password cracking, F3 - Threats, L4 Malicious Software and Application Attacks ...9Decks184Flashcards6Learners -
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
CISSP Sybex Study Guide
CISSP Sybex Study Guide
By: Rebecca Ma
Chapter 1 - Security Governance Through Principles And Policies, Chapter 2 - Personnel Security And Risk Management Concepts, Chapter 3 - Business Continuty Planning ...22Decks455Flashcards237Learners -
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
IS0001-03 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document Procedures ...36Decks190Flashcards24Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
Drills KnowBe4
Drills KnowBe4
By: Ies Ha
Acronyms and Abbreviations Drill, BasicComputer Key Terms Drill, Compliance Key Terms Drill ...10Decks155Flashcards4Learners -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning ...21Decks420Flashcards1Learner -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning ...22Decks524Flashcards1Learner -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning ...21Decks290Flashcards30Learners -
My CISSP Official Summary
My CISSP Official Summary
By: Unknown Unknown
Chap 11: Secure Network Architecture and Components, Chap 10: Secure Communications and Network Attacks, Chap 15: Security Assessment and Testing ...7Decks121Flashcards1Learner -
Course 5 - IT Security: Defense against the digital dark arts
Course 5 - IT Security: Defense against the digital dark arts
By: Jelly Santi
Week 1 - Malicious Software, Week 1 - Network Attacks, Week 1 - Other Attacks ...11Decks187Flashcards1Learner -
Terminology drill
Terminology drill
By: Merel Roest
Basic computer key terms, Phishing, Malicious software3Decks39Flashcards1Learner -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards1Learner -
Security+
Security+
By: elham hamid
1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts, 1.4 Explain the importance of using appropriate cryptographic solutions. ...12Decks267Flashcards2Learners -
malicious cs
malicious cs
By: Jaycen Horton
malicious software1Decks17Flashcards1Learner -
KnowBe4 - Product Knowledge
KnowBe4 - Product Knowledge
By: Hampus Eliasson
Basic Computer Terms, Phishing, Malicious Software ...9Decks39Flashcards1Learner -
InfoSec
InfoSec
By: Brian Hill
1 - Security Mindset, 8 - Firewall/Intrusion, 7 - Malicious Code ...8Decks27Flashcards1Learner -
CISSP
CISSP
By: Timothy Southern
Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity Planning ...22Decks38Flashcards1Learner