Learn Data Security
Study Data Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompSci
CompSci
By: Gleb Butyagin
Data Transmission and Data representation, Security Aspects and Internet Technologies, Computer Architecture and Languages ...15Decks361Flashcards7Learners -
Security+
Security+
By: Matt Miller
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers ...13Decks484Flashcards124Learners -
Salesforces
Salesforces
By: Chester Salcedo
Admin Cert, Interview Question: Salesforce Basics, Interview questions: Object Relationships ...8Decks604Flashcards35Learners -
CIPP-US
CIPP-US
By: Christina Russell
Ch 1 - Intro to Privacy, Ch 2 - Structure of U.S. Law, Ch 3 - Fed & State Regulators ...14Decks1,111Flashcards180Learners -
GCSE Computer Science - AQA 8525
GCSE Computer Science - AQA 8525
By: Mark Kennedy
1 Fundamentals Of Algorithms, 2 Programming, 3 Fundamentals Of Data Representation ...7Decks559Flashcards70Learners -
CISSP
CISSP
By: Christopher Duram
Security Models, Cryptography, Disaster Recovery and Business Continuity Planning ...9Decks124Flashcards39Learners -
CIIP
CIIP
By: Hunter Maureen
Software and Networking, Data Storage, Data Security & Patient Privacy ...6Decks328Flashcards1Learner -
APC
APC
By: Cally Nugent
Mandatory, Valuations, Inspection & Measurement ...8Decks579Flashcards2Learners -
CYBERSECURITY FUNDAMENTALS
CYBERSECURITY FUNDAMENTALS
By: Shahed Shdifat
Malicious Software, Data Base, Web Security ...5Decks80Flashcards1Learner -
Comp sci
Comp sci
By: Amrita Rana
Chap 1 - Data representation (no. systems, [text, sound, video, image], [data storage and file compression]), Chap 2.1 - data transmission, Chap 2.2 / 3 - Data transmission (error checking, encryption) ...16Decks693Flashcards1Learner -
European Data Protection CIPP E
European Data Protection CIPP E
By: Zleste Wanner
Data Protection Laws (1), Personal Data (2), Controllers and Processors (3) ...12Decks450Flashcards7Learners -
Digital Technology Theory
Digital Technology Theory
By: Eleanor Osborne
2.1 Data, 2.2 Digital Systems, 2.3 Digital Communciation ...5Decks168Flashcards2Learners -
AWS Data Specialty
AWS Data Specialty
By: Edson Andrade
AWS Data Collections, AWS Data Storage, AWS Data Processing ...20Decks961Flashcards4Learners -
CISSP
CISSP
By: user delete
Domain 1: Security and Risk Management, Domain 1: Security and Risk Management; Legal and Regulatory Issues, Domain 1: Security and Risk Management; Security and 3rd Parties ...20Decks274Flashcards34Learners -
Introduction to Information Systems for Health Information Technology
Introduction to Information Systems for Health Information Technology
By: Justin Duff
Chapter 1 - Introduction to Computers in Health Information Management, Chapter 2 - Information Integrity and Data Quality, Chapter 3 - Introduction to Databases and Data Analytics ...11Decks421Flashcards33Learners -
Information Technology
Information Technology
By: Deleted Deleted
Hardware Basics, Operating System Basics, Networking Basics ...16Decks247Flashcards157Learners -
Computer Science
Computer Science
By: Jacob Heyes
Organisation and Structure of Data, Hardware, Data Security ...6Decks208Flashcards1Learner -
Computer Science
Computer Science
By: Proud Mutata
Chapter 1. Information Representation, Chapter 2. Communication, Chapter 3. Hardware ...16Decks405Flashcards3Learners -
Security+ 701
Security+ 701
By: Charlie Aligaen
Sample Exam 1, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts. ...28Decks777Flashcards3Learners -
APC TH
APC TH
By: Tom Hughes
Purchase & Sale, Estate Agency Legislation, Leasing & Letting ...15Decks643Flashcards2Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%) ...4Decks477Flashcards106Learners -
CHIA
CHIA
By: Geoffrey Pearce
Domain A - Health Sciences, A.1. Health Concepts, A.2 Health Determinants ...73Decks4,773Flashcards1Learner -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
REGULATORY FRAMEWORK FOR BUSINESS TRANSACTIONS
REGULATORY FRAMEWORK FOR BUSINESS TRANSACTIONS
By: Bobby Dee
RFBT - OBLIGATIONS, RFBT - CONTRACTS, RFBT - SALES ...24Decks2,069Flashcards332Learners -
AIT 670
AIT 670
By: Tyler S
Week 2: Introduction to Cloud Computing, Week 3: Overview of Networking Concepts, Week 4: Overview of Security Concepts ...11Decks647Flashcards1Learner -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery ...16Decks329Flashcards27Learners -
Salesforce ADMIN -201-Winter2021
Salesforce ADMIN -201-Winter2021
By: Ginny Bertier
Business Accounts & Contacts, API Basics & App Builder, Salesforce Basics ...14Decks478Flashcards73Learners -
CCNA Security 210-260
CCNA Security 210-260
By: Brian Schroeder
Network Security Concepts, Common Security Threats, Implementing AAA in Cisco IOS ...21Decks567Flashcards225Learners -
RFBT
RFBT
By: Fair Anthonie Chaclag
Corporation Law, Cooperative Law, Ease of Doing Business ...29Decks1,456Flashcards219Learners -
AWS SAA
AWS SAA
By: Jeremy Lim
VPC, Storage, S3 ...20Decks605Flashcards5Learners