• Virtual Currency Overview

The concepts of virtual currency and digital currency can be difficult to comprehend. Since the financial industry is generally founded on physical assets, the thought of conducting business in a medium that cannot be carried in your pocket or put in a safe is unnerving. The underlying concerns are the standards by which the currency is measured.

Consider the characteristics of virtual currency and digital currency, and how they compare to one another. Additionally, think about these in regards to the context of virtualization and cloud computing. Remember that you must include technical content within your final report, but it is also important to be prepared to provide less technical explanations to decision makers, especially in the executive summary, conclusion, and the recommendations you provide. Once you are comfortable with these terms, consider these and their relationship to one another throughout the project and proceed to the next step, in which you will research virtual currency.

1)     
Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution’s cybersecurity policy requirements. Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.

2)     
After assessing cybersecurity technologies during your competitive research of virtual currency in the previous step. Now, take these technological elements and consider the policies that include aspects of virtualization and cloud computing. Consider the cybersecurity policies and constraints that affect these specific elements. Make a fourth column in the spreadsheet for policy constraints and document the findings.

3)     
It’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber-perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business. Provide a three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.

 

·       
External Bitcoin and Block-Chain Technology Audit (4 Pages PLUS 1 Page for the table or spreadsheet)

Bitcoin has become a successful globally appropriated form of virtual currency and digital currency (cryptocurrency) through its accomplished technology and practices. By many, it is still considered an emerging technology in the realm of cybersecurity. Within the first few steps, you reviewed virtual currency and gained an overview of cybersecurity methods such as encryption methods and other technology traits associated with various virtual currencies. In the next few steps, you will investigate the cross-cutting effects in Bitcoin’s use of block-chain technology and perform an external Bitcoin and Block-Chain Technology Audit for your company. You will scrutinize policy, budget, and technological capabilities to address cyber threats, as well as how these effects are managed at the enterprise, national, and international levels. Feel free to pull items from your findings thus far to frame this assignment.

1)     
In this step, develop a record keeping system specifically for block chain. This can be in the form of a table, spreadsheet, or other format. Determine variances from a cybersecurity perspective, consider Bitcoin’s encryption method, and other technological capabilities at the enterprise, national, and international level. Include other virtual currency technologies and reasons why they might have a better impact in these areas.

2)     
As CISO, direct the focus of the research into block chain as the underlying encryption technology to the dominant virtual currency — Bitcoin. As you have learned, emerging alternatives tend to have a disruptive effect on current technology. Block chain and other options would be expected to have similar results. In this step, continue the comprehensive review of block chain and related technologies regarding policy impacts. Review limitations which might be imposed or might involve other business affairs in the company’s cybersecurity arsenal. This should also include the perspective at the enterprise, national, and international levels.

3)     
In the last two steps, you have considered policy and technology capability impacts of block chain and related technologies viewed from enterprise, national, and international levels. As you probably have found or predicted, budget and resource trade-offs now need to be acknowledged and will be the final piece of your External Bitcoin and Block-Chain Technology Audit. This should also recognize and accommodate potential enterprise, national, and international constraints. Provide a four-page External Bitcoin and Block-Chain Technology Audit. Incorporate what you have identified during your cross-functional analysis of block-chain and digital-currency technology alternatives in regards to technological capabilities, policy, and budget trade-offs relative to enterprise, national, and international restrictions. This should be directed to senior leaders about the pros and cons, the options, and the alternatives that would facilitate their strategic decision making in defense of cyber threats.

Click here to request for this assignment help

#Virtual #Currency #Overview

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Dario Rivera

Description In a 5-6 page paper answer one of the following questions. Your paper should use 12 point, Times New Roman font (double-spaced throughout). The only header you need is your name (the inclusion of any additional information will lower your grade). You must include citations within the text (simply

Note: Respond to this discussion post. 250 words, 2 references

Note: Respond to this discussion post. 250 words, 2 references and apa format Thank you. Accreditation increases the overall quality of treatment in healthcare facilities. Accreditation programs can also improve person end results in some specialties. This improves the top quality of care by decreasing distinctions in exactly how different

After reading the article, submit an article review summarizing the

After reading the article, submit an article review summarizing the article. Please include the following components in your article review: Provide a title page. Provide a short introduction of the article to include the main idea(s). Include the purpose of this article. Provide an evaluation of the article: Is the

What is informed consent? Select at least one video from

What is informed consent? Select at least one video from this week (Ethics in Psychological Research or Key Issues in Psychological Research) to view for this assignment. What are the key points about ethics in research highlighted in each of these films, particularly those regarding informed consent? How would you

Overview: As you prepare to communicate the next steps in

 Overview: As you prepare to communicate the next steps in the consulting partnership between your organization, Business Consultants, and your client, New  Hampshire Business Products, you will prepare three deliverables using office productivity applications. For Milestone Two, you will prepare a draft of your  second deliverable: a Microsoft Excel spreadsheet.

To address this week’s topic of decision making in sport

 To address this week’s topic of decision making in sport organizations, choose a common problem or issue that sport organizations have faced. It can be a problem you are aware of from a team that you are a fan of, something you heard about in the news, or something you

According to Deloitte (2019) “Digital technologies are supporting health systems’

According to Deloitte (2019) “Digital technologies are supporting health systems’ efforts to transition to new models of patient-centered care and helping them develop “smart health” approaches to increase access and affordability, improve quality, and lower costs. New technologies are helping with diagnosis and treatment; helping with speed, quality, and accuracy;

View of Historical Linguistic Changes in Maltese

View of Historical Linguistic Changes in Maltese  Paper details kind of the paper: historical linguistics paper Subject: A View of Historical Linguistic Changes in Maltese Abstract Maltese is the only living Semitic language that is a national language of Malta, and it is an official language of the European Union.

a reflection on the article on Kodak . What are

 a reflection on the article on Kodak . What are your initial impressions of how Kodak managed the transition from print to digital photography? What do you think are some of the reasons why they failed to achieve greater success through this transition?  at least 500 words https://hbr.org/2016/07/kodaks-downfall-wasnt-about-technology

PLEASE DO NOT SUBMIT A BID IF YOU DO NOT

  PLEASE DO NOT SUBMIT A BID IF YOU DO NOT HAVE EXPERIENCE WITH GRADUATE-LEVEL WRITING. MUST FOLLOW ALL INSTRUCTIONS MUST BE FOLLOWED, AND NO PLAGIARISM. USE ONLY SCHOLARLY SOURCES AND ANSWER ALL QUESTIONS FOR THE ASSIGNMENT.  The Topic of my Research Proposal Project that needs to be focused on

Identify and discuss what type of laws (both civil and

Identify and discuss what type of laws (both civil and criminal) are most fraudsters charged with as a result of a fraud investigation. What similarities and differences do you see between civil and criminal laws relating to fraud cases? Be sure to include specific examples to back up your conclusions.

Network Threats and Attacks Subscribe You have now learned about

  Network Threats and Attacks  Subscribe You have now learned about recognizing security threats, vulnerabilities, and how to mitigate them. Almost every day, there are reports of an intrusion, breach of confidentiality, or some other high-profile attack. Find a news article about a recent network attack (no more than one

People from all over the world are focusing on how

People from all over the world are focusing on how to make CVs so powerful that they can boost their careers. In UAE, many companies are giving cv writing Dubai services to all the people who are willing to have professionally written documents. Because when the documents are written by

Students will watch a group therapy film or documentary, or

  Students will watch a group therapy film or documentary, or as directed by the facilitator. The activity must have all the confidentiality parameters of the participants, if it is in a real scenario.-Identify the type of group and services.-Observe the group dynamics.-Identify the stages that are generated in the

The principles regarding leases were recently updated by FASB, as

The principles regarding leases were recently updated by FASB, as discussed in the textbook. Explain two main differences between finance and operating leases under these new lease provisions.Select a publicly traded company and access its most recent financial statements, form 10-K. Include the name of the company in your subject

Read the following paragraph and identify its main pattern of

Read the following paragraph and identify its main pattern of organization. After you identify the pattern of organization, write a brief reflection (6-8 sentences) where you state the clues that helped you identify the organization of the paragraph. Remember to use proper standard language in your reflection. Acronyms are words

The following are the mileage yield per gallon which a

The following are the mileage yield per gallon which a test driver consumed for 5 containers each of four kinds of gasoline. Use non-parametric test at the level of significance alpha =.05 to check the claim that the there is no significant difference in the true average mileage yield of

Discussion: Women’s and Men’s Health, Infectious Disease, and Hematologic Disorders

   Discussion: Women’s and Men’s Health, Infectious Disease, and Hematologic Disorders As an advanced practice nurse, you will likely experience patient encounters with complex comorbidities. For example, consider a female patient who is pregnant who also presents with hypertension, diabetes, and has a recent tuberculosis infection. How might the underlying