C836 Fundamentals of Information Security

This class was created by Brainscape user Yakkie Poo. Visit their profile to learn more about the creator.

Decks in this class (14)

Chapter 1
Keeping data software and hardwar...,
The requirements that are set for...,
Cia 3
40  cards
Chapter 2
Who or what we claim to be 1,
The set of methods used to establ...,
What is the half step between ide...
32  cards
Chapter 3
What is the next step after a use...,
_______ defines what the user can...,
Policies or procedures used to co...
49  cards
Chapter 4
Provides us with the means to tra...,
Accountability depends on _______...,
A situation in which an individua...
14  cards
Chapter 5
The process of transforming reada...,
Readable data 2,
Unreadable data 3
37  cards
Chapter 6
Your adherence to the rules and r...,
Your adherence to the laws specif...,
Adherence to regulations that are...
41  cards
Chapter 7
Opsec 1,
A security and risk management pr...,
The five operations security proc...
16  cards
Chapter 8
The knowledge and the attention s...,
Humint 2,
Data gathered by talking to people 3
18  cards
Chapter 9
Physical security is largely conc...,
Which main category of assets is ...,
Bcp 3
14  cards
Chapter 10
When you divide a network into mu...,
Mechanism for maintaining control...,
Ids 3
27  cards
Chapter 11
Ways in which we can decrease our...,
Detects threats 2,
A technology that prevents the op...
12  cards
Chapter 13*
An attach that works by inputting...,
Occurs when multiple processes or...,
If we are not careful to validate...
28  cards
Chapter 12
Every modern mobile device contai...,
Modifying a mobile device to remo...,
Iot 3
4  cards
Chapter 14
A process that uses a specificall...,
A scan that is conducted using a ...,
Scans that don t require any cred...
4  cards

More about
C836 Fundamentals of Information Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Yakkie Poo's C836 Fundamentals of Information Security flashcards for their Western Governors University class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

C836-Fundamentals of Information Secu...
  • 9 decks
  • 192 flashcards
  • 135 learners
Decks: Chapter 1 What Is Information Security, Chapter 2 Identification And Authenticat, Chapter 3 Authorization And Access Contr, And more!
Information Security
  • 14 decks
  • 175 flashcards
  • 7 learners
Decks: Lecture 1, Lecture 2, Lecture 3, And more!
IT 350 - Fundamentals of Data Security
  • 13 decks
  • 810 flashcards
  • 277 learners
Decks: Chapter 1, Chapter 2 Planning And Policy, Chapter 3 Encryption, And more!
C836
  • 8 decks
  • 127 flashcards
  • 44 learners
Decks: C836 Ch5 Continued, C836 Ch 6, C836 Ch7, And more!
Make Flashcards