Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Information Technology
Information Technology
By: Jana Jäkel
01 Digital Transformation, 14 IT & Ethics, 02 Digitisation19Decks189Flashcards2Learners -
CIPM
CIPM
By: Jesse zigmund
Chapter 4 - Privacy Operational Lifecycle: Assess: Data Assessments, Chapter 5 - Privacy Operational Lifecycle - Protect, Chapter 7 - Sustain7Decks58Flashcards2Learners -
ag-2.0 ISO/IEC
ag-2.0 ISO/IEC
By: Anti Gondu
Week 1 - General Systems theory, Data, Information and Knowledge, Week 2 - Organising Data and Database Applications, Week 4 - e-Business Systems44Decks913Flashcards1Learner -
Ethics
Ethics
By: Christina Wilson
Principles, Consent, Confidentiality, privacy and data law5Decks60Flashcards4Learners -
Informations und Wissensmanagement
Informations und Wissensmanagement
By: Andreas Hein
Chapter1: What do “information” & “knowledge” really mean?, Chapter 2: Strategy and Information Management (Business IT Alignment), Tutorial 1: Analyzing IT-Strategy21Decks252Flashcards10Learners -
ISYS 201
ISYS 201
By: Helen Lo
Data Modeling & Table Mapping (ISYS), Queries, PivotTable12Decks272Flashcards2Learners -
Information Systems
Information Systems
By: Deanna McQuade
Paradigms/Disruptive Technology, Competitive Advantage, Computer Hardware/ Software And Networking6Decks84Flashcards2Learners -
CIPM MAY 2023
CIPM MAY 2023
By: Shreyas Amin
1. Intro To Privacy Program Management, 2. Frameworks and Governance, 3. Privacy Frameworks, Laws & Regulations11Decks93Flashcards3Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks29Decks377Flashcards5Learners -
IST 452
IST 452
By: seng lim
Legal Process, Criminal Law and Procedure, Electronic Evidence and Electronic Data Discovery5Decks77Flashcards2Learners -
CSC1016S
CSC1016S
By: Maryam Sonnie
Chapter 1 -getting started, Chapter 2 - Input and output, Chapter 3 - Classes some basics14Decks319Flashcards1Learner -
RFBT
RFBT
By: Laurice Dizon
Corporation, COOPERATIVES, GOVERNMENT PROCUREMENT13Decks151Flashcards1Learner -
Cloudflare Products
Cloudflare Products
By: Colton Becker
Bot Management, WAF, Access16Decks47Flashcards1Learner -
Electronic Health Records Summer 2020
Electronic Health Records Summer 2020
By: Miarasa Steele
Unit 1: Introduction to Computers in Health Information Management, Unit 2: The History of EHRs, Unit 3: Components of the EHR6Decks153Flashcards2Learners -
RFBT
RFBT
By: Top 7 CPALE
Banking Laws, Lemon Law, Anti Bouncing Checks Law37Decks622Flashcards8Learners -
CIPP-US
CIPP-US
By: Stephen Bellville
1. Privacy in the Modern Era, 2. Legal Environment, 3. Regulatory Enforcement10Decks297Flashcards1Learner -
Security+
Security+
By: Kevin Zheng
Encryption Algorithms, Certificate Formats, Ports26Decks242Flashcards1Learner -
CIPP/US KT
CIPP/US KT
By: Kelli Tarala
Federal Agencies Enforcement, Overview of Privacy Law, Privacy and Law Enforcement5Decks44Flashcards1Learner -
Introduction To Information Management Systems
Introduction To Information Management Systems
By: Oliver Tørnkvist
Unit 1, Unit 2 - Business Processes, Information Systems And Innovation, Unit 3 - Introduction to Enterprise Systems and Technologies6Decks39Flashcards13Learners -
Health Technology and Innovations in EU
Health Technology and Innovations in EU
By: Sima Andreea
Health Technological Innovation Basics, Safety and health technological innovation, Privacy, data protection and health technological innovation11Decks75Flashcards2Learners -
DSCI Certified Privacy Professional
DSCI Certified Privacy Professional
By: SREEMAN MISHRA
9. Information Lifecycle, 6. Trans-border Data Flows, 4. Privacy Laws and Regulations4Decks30Flashcards3Learners -
GCSE Computing
GCSE Computing
By: Rhea Rhea
3.4 Computer Systems, 3.8 Aspects Of Software Development, 3.7 Ethical, Legal And Environmental Impacts Of Digital Technology On Wider Society, Inclusing Issues Of Privacy8Decks196Flashcards2Learners -
MIS
MIS
By: Spencer Wilkie
Big Data, AI, BI, Vendor Management, RFP and RFI, Security, Risk Management, Privacy6Decks99Flashcards2Learners -
RFBT
RFBT
By: Mikaela Gabrielle Quimora
INTELLECTUAL PROPERTY LAW, PHILIPPINE DEPOSIT INSURANCE CORPORATION LAW, BANK SECRECY LAWS7Decks232Flashcards1Learner -
Local Area Networks
Local Area Networks
By: noah carlo-armstrong
Windows Server Installation, server roles, powershell22Decks283Flashcards1Learner -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.24Decks258Flashcards39Learners -
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
By: 3DPD Unknown
Describe security and compliance concepts, Describe identity concepts, Describe the services and identity types of Azure AD17Decks665Flashcards2Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.40Decks662Flashcards1Learner -
Apple Cert Training
Apple Cert Training
By: Julian Mcneil
Backing Up iPhone or iPad, Moving to a New iPhone or iPad, Restoring iPhone or iPad to Factory Settings30Decks94Flashcards13Learners -
CIPP/US
CIPP/US
By: Matt Heyert
Chapter 4 - Limits on Private-sector collection and use of data, Chapter 2 - U.S. Legal Framework, Chapter 3 - Federal and State Regulators and Enforcement of Privacy Law6Decks196Flashcards1Learner