Learn "Malicious Software"
Study "Malicious Software" using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Top "Malicious Software" Flashcards Ranked by Quality
-
HIPPO
HIPPO
By: Media PRO
61 Cards –4 Decks –10 LearnersSample Decks: Acronyms, Key Terms, PhishingShow Class -
CS6035 InfoSec Exam 1
CS6035 InfoSec Exam 1
By: Kent Lorenz
154 Cards –9 Decks –144 LearnersSample Decks: P1L1 Security Mindset, P1L2 Software Security, P1L3 Operating SystemsShow Class -
LIS 4774
LIS 4774
By: Tony Cazarez
309 Cards –9 Decks –62 LearnersSample Decks: Ch. 3, User Authentication, Midterm PrepShow Class -
CYBERSECURITY FUNDAMENTALS
CYBERSECURITY FUNDAMENTALS
By: Shahed Shdifat
80 Cards –5 Decks –1 LearnerSample Decks: Malicious Software, Data Base, Web SecurityShow Class -
Information Security
Information Security
By: Felix Hüneburg
230 Cards –11 Decks –88 LearnersSample Decks: Introduction, L2 - Securicy Policies, Social EngineeringShow Class -
CS6035 - Intro to Info Sec
CS6035 - Intro to Info Sec
By: Michael Mroczka
715 Cards –23 Decks –229 LearnersSample Decks: P1L1: Security Mindset, P1L2: Software Security, P1L3: Operating SystemsShow Class -
KnowBe4 Training
KnowBe4 Training
By: Jordan Flis
115 Cards –8 Decks –5 LearnersSample Decks: Basic Computer Key Terms, Tools of the Bad Guys, Malicious SoftwareShow Class -
Product Overview Vocab
Product Overview Vocab
By: Shira Levy
119 Cards –9 Decks –2 LearnersSample Decks: Basic Computer Key Terms, Phishing, Malicious SoftwareShow Class -
KB4 Onboarding Terms
KB4 Onboarding Terms
By: Derek Lawrence
122 Cards –9 Decks –3 LearnersSample Decks: Basic Computer Key Terms, Phishing, Malicious SoftwareShow Class -
Cybersecurity
Cybersecurity
By: Jesus Barboza
127 Cards –9 Decks –2 LearnersSample Decks: Acronyms and Abbreviations, KnowBe4 - Free Tools, Compliance - Key TermsShow Class -
Internet Security
Internet Security
By: Edward Chancellor
184 Cards –14 Decks –4 LearnersSample Decks: Introduction, Symmetric Block Encryption, Stream CiphersShow Class -
CISSP
CISSP
By: Rob McCauley
1,024 Cards –22 Decks –113 LearnersSample Decks: Introduction, Chapter 1: Access Control, Chapter 2: Access Control Attacks and MonitoringShow Class -
Information Security
Information Security
By: Christian Edvall
184 Cards –9 Decks –6 LearnersSample Decks: L2 - Passwords and password cracking, F3 - Threats, L4 Malicious Software and Application AttacksShow Class -
CISSP Sybex Study Guide
CISSP Sybex Study Guide
By: Rebecca Ma
455 Cards –22 Decks –230 LearnersSample Decks: Chapter 1 - Security Governance Through Principles And Policies, Chapter 2 - Personnel Security And Risk Management Concepts, Chapter 3 - Business Continuty PlanningShow Class -
CISSP OSG
CISSP OSG
By: Sad Summertron
477 Cards –19 Decks –41 LearnersSample Decks: Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of AssetsShow Class -
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
184 Cards –35 Decks –28 LearnersSample Decks: IS0001-03 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document ProceduresShow Class -
CISSP
CISSP
By: David Caranfa
183 Cards –27 Decks –1 LearnerSample Decks: Risk Management, Controls, BC/DCShow Class -
Drills KnowBe4
Drills KnowBe4
By: Ies Ha
155 Cards –10 Decks –4 LearnersSample Decks: Acronyms and Abbreviations Drill, BasicComputer Key Terms Drill, Compliance Key Terms DrillShow Class -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
420 Cards –21 Decks –1 LearnerSample Decks: Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity PlanningShow Class -
CISSP
CISSP
By: Eric Lekus
524 Cards –22 Decks –1 LearnerSample Decks: Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity PlanningShow Class -
Security+
Security+
By: elham hamid
256 Cards –10 Decks –1 LearnerSample Decks: 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts, 1.4 Explain the importance of using appropriate cryptographic solutions.Show Class -
Course 5 - IT Security: Defense against the digital dark arts
Course 5 - IT Security: Defense against the digital dark arts
By: Jelly Santi
187 Cards –11 Decks –1 LearnerSample Decks: Week 1 - Malicious Software, Week 1 - Network Attacks, Week 1 - Other AttacksShow Class -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
290 Cards –21 Decks –28 LearnersSample Decks: Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity PlanningShow Class -
My CISSP Official Summary
My CISSP Official Summary
By: Unknown Unknown
121 Cards –7 Decks –1 LearnerSample Decks: Chap 11: Secure Network Architecture and Components, Chap 10: Secure Communications and Network Attacks, Chap 15: Security Assessment and TestingShow Class -
malicious cs
malicious cs
By: Jaycen Horton
17 Cards –1 Decks –1 LearnerSample Decks: malicious softwareShow Class -
InfoSec
InfoSec
By: Brian Hill
27 Cards –8 Decks –1 LearnerSample Decks: 1 - Security Mindset, 8 - Firewall/Intrusion, 7 - Malicious CodeShow Class -
Security Plus 701
Security Plus 701
By: Zoning Unknown
70 Cards –30 Decks –1 LearnerSample Decks: Exam Note, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security conceptsShow Class -
CISSP
CISSP
By: Jennifer Toren
19 Cards –21 Decks –1 LearnerSample Decks: Chapter 1: Security Governance, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity PlanningShow Class -
CISSP
CISSP
By: Timothy Southern
25 Cards –22 Decks –1 LearnerSample Decks: Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity PlanningShow Class