Learn Data Security
Study Data Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
HIS 1
HIS 1
By: pink popcorn
Materials Management, Clinical Data Repositories, Ethics, Privacy, and Security ...8Decks399Flashcards8Learners -
IT & Data Assurance I (IST293)
IT & Data Assurance I (IST293)
By: Kathryn Cox
Module 1 - Introduction to Security, Module 2: Threat Management & Cybersecurity Resources, Module 4: Endpoint & Application Development Security ...15Decks655Flashcards7Learners -
Yr 10/B Cp1
Yr 10/B Cp1
By: Computing Dept @ Tomlinscote
1 Fundamentals Of Algorithms, 2 Programming, 3 Fundamentals Of Data Representation ...6Decks441Flashcards26Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Computer science
Computer science
By: Fadekemi Odu-onikosi
hexadecimal, data transmission, Error checking methods ...13Decks137Flashcards39Learners -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors ...17Decks188Flashcards5Learners -
AWS 2018 - By Service Section - FAQs
AWS 2018 - By Service Section - FAQs
By: Parri Pandian
Alexa for Business | Calendar integration, Alexa for Business | Calling and conferencing, Alexa for Business | Enrolled users and personal devices ...744Decks6,164Flashcards99Learners -
Z/ HIGHER Computing Science
Z/ HIGHER Computing Science
By: Jill Beard
"SDD", "ISDD", SDD Notes lol N5 ...27Decks1,061Flashcards74Learners -
CSX
CSX
By: L Lawliet
Section 1: Cybersecurity Introduction, Section 2: Cybersecurity Concepts, Section 3: Security Architecture ...4Decks248Flashcards21Learners -
HEALTH INFORMATION SYSTEM FOR MEDICAL LABORATORY SCIENCE
HEALTH INFORMATION SYSTEM FOR MEDICAL LABORATORY SCIENCE
By: JASMINE JULIA MARI MUNOZ
Health Care System, Philippine Health Care Delivery System, OVERVIEW OF HEALTH INFORMATICS ...14Decks451Flashcards15Learners -
Snowflake Architect Cert
Snowflake Architect Cert
By: Christine Carroll
General Architecture, Parameters, Time Travel ...14Decks253Flashcards5Learners -
AWS TAM TECH
AWS TAM TECH
By: KeepingIt Anonymous
App Dev Domain, Networking Domain, Database Domain ...9Decks225Flashcards1Learner -
Informatics 324
Informatics 324
By: Samuel Becker
AI, Data management, CRM ...9Decks99Flashcards3Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
Network +
Network +
By: Robert Livingston
Network Models, Topologies and Cabling, Ethernet ...20Decks740Flashcards1Learner -
AWS
AWS
By: Daniel Lemke
Facts, Storage, Product Names ...16Decks726Flashcards1Learner -
OCR ICT unit 3
OCR ICT unit 3
By: Marshall Blanc
Threats to Cyber Security, Types of Cyber Attacker, Cyber Security - Identifying Assets & Risks ...14Decks133Flashcards30Learners -
RICS APC Valuation Pathway
RICS APC Valuation Pathway
By: Christie Harvey
Ethics, Local Taxation, Health and Safety ...21Decks290Flashcards118Learners -
AWS Data Analytics
AWS Data Analytics
By: Benjamin Frederick
Domain 4: Analysis, Domain 5: Visualization, Domain 6: Security ...9Decks289Flashcards48Learners -
computer science
computer science
By: Francesca GARCIA-ITOJE
data types and structures, TCP/IP layer, validation ...24Decks381Flashcards1Learner -
Cyber
Cyber
By: William Reese
Acronym, Ecosystem (Companies and what they do), Cybersecurity Attack Types ...51Decks1,210Flashcards1Learner -
Architecture
Architecture
By: E Mi
Technology trends, Memory hierarchy, Compiler techniques and prefetching ...11Decks452Flashcards1Learner -
Health Information System
Health Information System
By: Jhio Camarin
concepts of data privacy, Health Information system, Ethics, Data Privacy and Security in Health Informatics3Decks89Flashcards2Learners -
Eduqas a-level computer science
Eduqas a-level computer science
By: Unknown Unknown
Systems analysis, System design, Algorithms and programs ...12Decks377Flashcards1Learner -
COG170 Fundamentals
COG170 Fundamentals
By: Michelle Dempsey
Radar dashboard, SlicerDicer Population, Data lineage ...11Decks111Flashcards39Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
AWS sysops admin- associate 2020
AWS sysops admin- associate 2020
By: erik MOLNAR
CloudWatch and Monitoring stuff, Deployment and Provisioning, High Availability ...12Decks575Flashcards23Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
RICS APC - GD
RICS APC - GD
By: Greg Donald
Case Study, CPD, Ethics, rules of conduct & professionalism ...20Decks2,219Flashcards5Learners -
CIPP/US 2.5.1
CIPP/US 2.5.1
By: Kathleen Kramer
Basic Terms/Privacy Overview, Structure and Enforcement of US Law, Info Management in US ...14Decks341Flashcards2Learners