This class was created by Brainscape user Chris Valesey.

By:

Decks in this class (18)

Chapter 1 - Information Systems Security Policy Management
Requirements associated with ____...,
____________________ is the act o...,
__________________ is a framework...
29  cards
Chapter 2 - Business Drivers for Information Security Policies
A business must find a way to bal...,
Good security policies keep the b...,
The three most common security co...
28  cards
Chapter 3 - Compliance Laws and InfoSec Policy Requirements
_______________ in e commerce bro...,
_______________ in e commerce bro...,
____________ is the concept that ...
28  cards
Chapter 4 - Business Challenges Within the Seven Domains of IT Responsibility
The ________________ domain of a ...,
The ________________domain of a t...,
The ________________domain of a t...
48  cards
Chapter 5 - Information Security Policy Implementation Issues
__________________ can create com...,
To promote the importance of info...,
_______________ is measured as th...
45  cards
Chapter 6 - IT Security Policy Frameworks
An information security program c...,
Three industry standard policy fr...,
Which of the following is the fir...
25  cards
Chapter 7 - How to Design, Implement, and Maintain IT Security Policies
In the ______________ operating m...,
In a ______________ operating mod...,
In a _______________ operating mo...
60  cards
Chapter 8 - IT Security Policy Framework Approaches
___________ is a framework for va...,
_____________ is heavily focused ...,
____________ is a framework and s...
52  cards
Chapter 9 - User Domain Policies
_______________ states that the e...,
Security experts consider _______...,
The major advantage people have o...
33  cards
Chapter 10 - IT Infrastructure Security Policies
The key purpose of infrastructure...,
What are three common ways to org...,
A common document type in a polic...
81  cards
Chapter 11 - Data Classification and Handling Policies and Risk Management Policies
_____________ in its simplest for...,
Three approaches to reducing the ...,
The department of energy uses the...
48  cards
Chapter 12 - IRT Policies
An _____________ is any event tha...,
A n _____________ is a technique ...,
Attacks related to a n __________...
45  cards
Quiz 1 & 2
Tf the legal concept of nonrepudi...,
The following are all true of gov...,
During the cobit ____________ dom...
20  cards
Quiz 3 & 4
True or false the public sector a...,
The family educational rights and...,
True or false the committee of sp...
49  cards
Quiz 5 & 6
In a hierarchical organization th...,
Hierarchical models have many adv...,
True or false in general implemen...
49  cards
Quiz 7 & 8
Policies and standards are a coll...,
When publishing a policy and stan...,
Four basic business models align ...
50  cards
Quiz 9 & 10
All of the following are true of ...,
In april 2018 an attacker gained ...,
Imagine a scenario in which an em...
46  cards
Quiz 11 & 12
Classifying all data in an organi...,
True or false security policies d...,
Risk management is a both a gover...
46  cards

More about
MIS 593

  • Company name Unspecified
  • Training purpose Unspecified
  • Industry Unspecified
  • Number of employees who could use this Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....