Laws And Lists Flashcards
Morovec’s Paradox
AI can compete high level reasoning with little effort but simple tasks (walking) require enormous computational resources
4th industrial revolution
Digital tech interacting with biology
3 laws of robotics
1) robot may not injure human
2) robot must obey orders
3) robot must protect itself as long as 1 and 2 are not broken
Boston dynamics
Robots move more like animals than humans to reduce paradox
Moore’s law
Digital computing power double every 2 years
4 Ts (risk)
Tolerate, Treat, Transfer, Terminate
Risk mgt principles (Hopkins)
1) framework and processes should be customized and proportionate
2) appropriate and timely involvement of stakeholders
3) structured and comprehensive approach
4) RM is part of all org activities
5) RM anticipates, detects, acknowledges and responds to change
6) RM explicitly considers any limitations of available info
7) human culture factors influence all aspects of RM
8) RM is continually improved through learning and experience.
Evan’s 5 digital business models
1) Digitizing products & services (Netflix)
2) Running or participating in digital platforms (Amazon)
3) Tapping into sharing economy/crowd sourcing (Tesla)
4) Reshaping Value Networks (Uber, Airbnb)
5) New models of monetization- free network (Facebook)
Risk of Digital Business
Customer satisfaction rating are public and can cause a loss of business. Bad web design, payment hacking, badly written electronic communications, fraud due to online anonymity. (TSB Bank)
Hopkin’s 4 kind of digital risks
1) Compliance risks (regulations)
2) Hazard risks (hacking, denial of service attacks)
3) Control risks (software bugs)
4) Opportunity risks (risk taken to gain return)
6 Cyber Defense Points
1) Data
2) Devices
3) Applications
4) Systems
5) Networks
6) Other communication channels
4 categories of cyber security control
1) physical
2) technical
3) procedural
4) legal
5 Steps - Cyber Security Framework
steps 1-2 are proactive
steps 3-5 are reactive
1) Identify (asset value)
2) Protect (with security)
3) Detect (any compromised account or device)
4) Respond (quarantine the problem)
5) Recover (replace and fix compromised data)
5 Types of Insider Information
1) unauthorized disclosure of data
2) process corruption
3) facilitation of 3rd party access
4) physical sabotage
5) electronic/it sabotage
3 dimensions of value classification
1) confidentiality
2) integrity
3) availability
and sometimes consent