Final Virtual Currency Applicability Report

·       
Risk Mitigation Strategy (4 Pages)

1)     
Based on what you have learned about risk management, dust off your competitive research spreadsheet, add a final column, and address the cybersecurity risk in each alternative and how to manage it. Address the application of virtual currency and encryption to other aspects of the institution’s cybersecurity. Where do they fit? Virtual currency could expand the attack vectors of cyber criminals. Include information on this expansion of cyberattack technologies. Summarize the risk implications that were found during your research in a one-page summary for the category of risk from your research.

2)     
Recognize the need to distinguish between the technology and policy issues that are involved. As an update to your ongoing analysis, categorize the risk as technical or policy. The classification is based on risk, not the solution. In other words, you might have documented what appears to be a technical condition or change that actually triggers a policy risk. As such, for the purpose of this reporting, it would be classified on the policy risk side of the ledger.

3)     
Now that you have categorized the risks, it’s time to consider risk management for virtual currency. Begin the process of addressing those risks from a strategic response perspective. What direction will be taken in the event of one or more of the identified risks occurring? This brief three-page report is an integral part of the Virtual Currency Applicability Report. It is not intended as a play-by-play procedures manual in the event of a breach. It is intended, as is the final report, as an overview of a strategic response should risk mitigation be required.

 

·       
Final Virtual Currency Applicability Report (13 Pages)

1)     
These next two steps will prepare you for the final submission of the Digital Currency Applicability Report. This is a separate information from the previous three but should represent as a formal document to stakeholders, additional elements should be present in the final Virtual Currency Applicability Report. This final report should easily reflect all three previous researches and supplemental materials. Provide an executive overview to set the stage and address concerns expressed and implied by the assignment. This will provide senior leadership streamlined information that you have found during the cybersecurity review of virtual currency and related concerns. This should include future opportunities and risks. Finally, a condensed conclusion should be prepared for the mitigation.

2)     
Organize the report with an executive overview and conclusion. Provide recommendations on other issues that may have yet to be addressed. As the CISO, the primary issue and area of expertise is cybersecurity. Senior leadership is likely going to want answers to several questions, such as: Can we use an encryption technology without virtual currency? Has a cost-benefit analysis been conducted? What would be the impact on our customers? As you can see, the concerns are not simply technical. The decision includes financial and policy questions that must be addressed.

#Final #Virtual #Currency #Applicability #Report

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Service Marketing Management Concepts

Description 2500 words 10% + or – Based on Carphone Warehouse. With reference to a service organisation of your choice, critically evaluate how the following approaches to service marketing management – namely, • process improvement, • human aspects and • managing resource capacity can potentially contribute to the success of

Mobile Malware

 Select one of the following and discuss in no less than three paragraphs.Your answers must focus on the discussion questions and they must specifically address the issues. You need to apply the concepts and theories you have learned. Think logically, when writing your discussions. Vague and general answers without any

After reading the assignments in module 2, imagine you are

After reading the assignments in module 2, imagine you are in the same situations as one of the fiction characters and real people. What moral decisions would you have made and why? How would emotions and the situational context have played a role?   The readings are the files below Instructions:

Follow these steps to complete our NIL project. Student Athlete

Follow these steps to complete our NIL project. Student Athlete Selection Identify an amateur athlete to represent, and gain an understanding of what they can and can’t do.  Here are some important rules to consider. Watch videos in Canvas for more details. Consider NIL rules – athletes can hire representation

Before beginning work on this week’s discussion post, review the

Before beginning work on this week’s discussion post, review the following resources: From the below list, select one topic for which you will lead the discussion in the forum this week. Early in the week, reserve your selected topic by posting your response (reservation post) to the Discussion Area, identifying

Q1. Read Chapter 9 in the textbook: Cluster Analysis Textbook:

Q1. Read Chapter 9 in the textbook: Cluster Analysis Textbook: Tan, Pang-Ning. Introduction to Data Mining What are the characteristics of anomaly detection?  What are the detection problems and methods? What are the statistical approaches when there is an anomaly found? Compare and contrast proximity and clustering based approaches. Follow

Need question answer for my my part of a paper.

Need question answer for my my part of a paper. Please review the paper for better understand how to answer these question. I. Requirements Checklist A.  Technical Requirements – – Five requirement statements setting out the system performance specifications. B.  Security Requirements –  – Five requirement statements covering various aspects

Science of GMOs

1) Go through your kitchen and pick out 10 different food items. Separate and list them into two columns – those that are GMOs and those that are not. 2) For each item, justify why you classified them as GMO or non-GMO (this must be fact based and not just

Leader Analysis

Select a public figure, preferably a business leader or politician, and determine through research and analysis if the individual is an ethical leader. Keep in mind that all people possess virtues and vices, and while they may strive to support ethical tenets, they may fail at times. Choose one virtue

Managed Care and Public Policy Various types of managed care

Managed Care and Public Policy Various types of managed care organizations have emerged due to forces imposed by the state and the federal governments, such as the HMO Act of 1973.  Address the following: Evaluate the impact of one federal and one state-level public health policy. Compare and contrast the

Write a five to six (5-6) page paper in which you: 1. Select a

Write a five to six (5-6) page paper in which you: 1. Select a specific method of energy production. Determine the most significant health risk associated with the production of this energy source, and recommend a process improvement that could significantly reduce the level of risk associated with the current

Watergate: Video critique

In preparation for this assignment, click the link below to view the video segment. PBS (Producer). (2013). Watergate (Segment 7 of 22) [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login? auth=CAS&url=http://fod.infobase.com/PortalPlaylists.aspx?wID=273866&xtid=58630&loid=277079  After watching the video segment, review the 14 principles provided in Title 5 of the Code of Federal Regulations (5 C.F.R.) §

Criminal Justice Ethics – Week 3 Case Study Week 3

  Criminal Justice Ethics – Week 3 Case Study Week 3 Case Study Review this video https://www.youtube.com/watch?v=Wbppcmru8eA After reviewing, the video above that explains the evolution of Tasers by finding two articles – one that supports the use of Tasers and one that dissuades the use of Tasers by law

Underrepresented Students in U.S. Study Abroad Programs

Underrepresented Students in U.S. Study Abroad Programs  Paper details 1. Introduction (roadmap to essay, proper thesis, & clarity) 15 (5pts per each) 2.Structure (flow between paragraphs and sections, development of an argument) 20 (10 pts per each) 3. Conclusion (bookending, linking back to thesis/introduction, suggests new avenues for research or

Week 7 Discussion: Virtuous Person, Virtuous Citizen 2929 unread replies.3030

Week 7 Discussion: Virtuous Person, Virtuous Citizen 2929 unread replies.3030 replies. Required ResourcesRead/review the following resources for this activity: IntroductionEach person owes a duty to himself or herself and to the world to study ethics and to engage in thoughtful debate about what is right, and what is wrong. It

Choosing an LMS for an organization can be a daunting

Choosing an LMS for an organization can be a daunting experience. Many variables need to be taken into account when weighing all the options. Imagine that you work for an educational organization or a training department for an organization (for example, higher education, corporate training, military, or nonprofit). Your organization