Construction Project Management Essentials

Equipment Hire and Maintenance Management

Establish and monitor policies, procedures, and processes for equipment hire and maintenance. Consider the following example:

Example: Forklifts

  • Policy: The company utilizes a reputable supplier, such as Kennards, and ensures all operators possess the required licenses.
  • Procedure: Complete a standardized order form and obtain necessary authorization before hiring equipment.
  • Process: Contact Kennards with the approved order form. Upon delivery, thoroughly check
Read More

Networking, Security, and Enterprise Systems Fundamentals

Computer Networks and Internet Technology Essentials

True/False Questions

  1. Telephone networks are fundamentally different from computer networks. TRUE
  2. Increasingly, voice, video, and data communications are all based on Internet technology. TRUE
  3. To create a computer network, you must have at least two computers. TRUE
  4. An NOS must reside on a dedicated server computer in order to manage a network. FALSE
  5. A hub is a networking device that connects network components and is used to filter and forward data to
Read More

Engineering Ethics, Standards, and Project Management

Equity and Discrimination in Engineering

Equality

  • It is illegal to discriminate based on: age, disability, sex, sexual orientation, marriage and civil partnership, pregnancy and maternity, religion or belief, race, and gender reassignment.
  • Direct Discrimination: Treating someone less favorably because of a protected characteristic. For example, not promoting someone because they are older.
  • Indirect Discrimination: A policy or practice that applies to everyone but disadvantages a particular group. For
Read More

Essential Business and Information Technology Concepts

Key Business and Information Technology Definitions

Business Functions

Specialized tasks performed within a business organization, including manufacturing and production, sales and marketing, finance and accounting, and human resources.

Business Model

An abstraction of what an enterprise is and how it delivers a product or service, demonstrating how the enterprise creates wealth.

Business Processes

The unique ways organizations coordinate and organize work activities, information, and knowledge to produce

Read More

Information Security Fundamentals: Risk, Access, and Compliance

Risk Management Principles

Risk: The probability of an unwanted occurrence, such as an adverse event or loss. Risk is calculated as: Threat * Vulnerability.

Risk Management Process

The management of uncertainty within an organization as it relates to information systems. The goal is to maintain a balance between the benefits of information systems (IS) and the risks associated with IS.

Risk Management Phases

The Risk Management process comprises two main stages:

  • Risk Assessment (Phases 1-3)
  • Risk Control
Read More

Secure Access Control & Digital Identity Management Strategies

Unit 1: Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) in Workflow Systems

Introduction to RBAC

Role-Based Access Control (RBAC) is an advanced access control model used to regulate system access based on predefined roles within an organization. Instead of assigning permissions to individual users, RBAC assigns roles to users, and each role is associated with specific permissions. This model enhances security, simplifies management, and ensures that users can access only the resources

Read More