Cybersecurity Governance and Risk Management Principles
Governance
Documentation Hierarchy
- Understand the hierarchy in terms of specificity and enforceability:
- Policies: High-level rules (e.g., “All systems must be patched monthly.”)
- Standards: Mandatory requirements to meet the policy (e.g., “Use AES-256 for encryption.”)
- Guidelines: Best practices, optional (e.g., “Avoid using public Wi-Fi.”)
- Procedures: Step-by-step instructions (e.g., “How to apply Windows patches.”)
Tip: Expect questions like, “What document outlines how a task should be done?” — answer:
Read MoreEssential Techniques for Project Management and Inventory Control
ABC Analysis: Inventory Control Technique
- ABC analysis is an inventory control technique used to classify items based on their annual consumption value.
- It follows the Pareto principle where a few items contribute to most of the inventory value.
- Category A items are few in number but have very high value and need strict control.
- Category B items have moderate value and require normal control and periodic review.
- Category C items are large in number but have very low value and need simple control.
- The
Business Operations: Product Life Cycle and Plant Decisions
1. Product Life Cycle (PLC)
🔹 Meaning:
The Product Life Cycle refers to the stages a product goes through from its introduction in the market until it is withdrawn. It helps managers make decisions regarding marketing, production, pricing, and resource allocation.
🔹 Stages of PLC:
- Introduction Stage
- Product launched in the market.
- High marketing and promotional expenses.
- Low or no profit due to heavy investment.
- Objective: Create awareness and attract early adopters.
- Growth Stage
- Demand increases rapidly.
Organizational Foundations and Security Practices in Software Development
1. Organisational Foundations: Mission, Goals, and Objectives
Mission Statements
- A mission statement represents the collective goals of an organisation.
- It is a statement explaining why the organisation exists and helps guide its strategic decisions.
- Examples include:
- Tesla: “Tesla’s mission is to accelerate the world’s transition to sustainable energy.”
- TED: “Spread ideas.”
- Ikea: “To create a better everyday life for the many people.”
- Patagonia: “Build the best product, cause no unnecessary
Understanding Turing Machines and Their Complexities
Turing Machine
The Turing machine is a collection of the following components: M = (Q, E, Γ, δ, q0, B, F). 1) Q is a finite set of states. 2) T is a finite set of external symbols. 3) E is a finite set of input symbols. 4) A or B or B in T is a blank symbol, majorly used as an end marker for input. 5) δ is a transition or mapping function.
Design of TM
The Turing machine can be modeled with the help of the following representation: 1) The input tape has an infinite number of cells, each cell containing
Read MoreEssential Concepts of IS, OS, DBMS, and Data Visualization
Information Systems (IS) Fundamentals
Defining an Information System (IS)
An Information System (IS) consists of interrelated components that collect (or retrieve), process, store, and distribute information for business decisions.
The Five Components of an IS
- Data
- People
- Networks
- Hardware
- Software
IS Components and Data Access
Access is a data management application where data can be created, deleted, or stored. Data is one of the five essential components making up an Information System.
