• Virtual Currency Overview

The concepts of virtual currency and digital currency can be difficult to comprehend. Since the financial industry is generally founded on physical assets, the thought of conducting business in a medium that cannot be carried in your pocket or put in a safe is unnerving. The underlying concerns are the standards by which the currency is measured.

Consider the characteristics of virtual currency and digital currency, and how they compare to one another. Additionally, think about these in regards to the context of virtualization and cloud computing. Remember that you must include technical content within your final report, but it is also important to be prepared to provide less technical explanations to decision makers, especially in the executive summary, conclusion, and the recommendations you provide. Once you are comfortable with these terms, consider these and their relationship to one another throughout the project and proceed to the next step, in which you will research virtual currency.

1)     
Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution’s cybersecurity policy requirements. Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.

2)     
After assessing cybersecurity technologies during your competitive research of virtual currency in the previous step. Now, take these technological elements and consider the policies that include aspects of virtualization and cloud computing. Consider the cybersecurity policies and constraints that affect these specific elements. Make a fourth column in the spreadsheet for policy constraints and document the findings.

3)     
It’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber-perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business. Provide a three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.

 

·       
External Bitcoin and Block-Chain Technology Audit (4 Pages PLUS 1 Page for the table or spreadsheet)

Bitcoin has become a successful globally appropriated form of virtual currency and digital currency (cryptocurrency) through its accomplished technology and practices. By many, it is still considered an emerging technology in the realm of cybersecurity. Within the first few steps, you reviewed virtual currency and gained an overview of cybersecurity methods such as encryption methods and other technology traits associated with various virtual currencies. In the next few steps, you will investigate the cross-cutting effects in Bitcoin’s use of block-chain technology and perform an external Bitcoin and Block-Chain Technology Audit for your company. You will scrutinize policy, budget, and technological capabilities to address cyber threats, as well as how these effects are managed at the enterprise, national, and international levels. Feel free to pull items from your findings thus far to frame this assignment.

1)     
In this step, develop a record keeping system specifically for block chain. This can be in the form of a table, spreadsheet, or other format. Determine variances from a cybersecurity perspective, consider Bitcoin’s encryption method, and other technological capabilities at the enterprise, national, and international level. Include other virtual currency technologies and reasons why they might have a better impact in these areas.

2)     
As CISO, direct the focus of the research into block chain as the underlying encryption technology to the dominant virtual currency — Bitcoin. As you have learned, emerging alternatives tend to have a disruptive effect on current technology. Block chain and other options would be expected to have similar results. In this step, continue the comprehensive review of block chain and related technologies regarding policy impacts. Review limitations which might be imposed or might involve other business affairs in the company’s cybersecurity arsenal. This should also include the perspective at the enterprise, national, and international levels.

3)     
In the last two steps, you have considered policy and technology capability impacts of block chain and related technologies viewed from enterprise, national, and international levels. As you probably have found or predicted, budget and resource trade-offs now need to be acknowledged and will be the final piece of your External Bitcoin and Block-Chain Technology Audit. This should also recognize and accommodate potential enterprise, national, and international constraints. Provide a four-page External Bitcoin and Block-Chain Technology Audit. Incorporate what you have identified during your cross-functional analysis of block-chain and digital-currency technology alternatives in regards to technological capabilities, policy, and budget trade-offs relative to enterprise, national, and international restrictions. This should be directed to senior leaders about the pros and cons, the options, and the alternatives that would facilitate their strategic decision making in defense of cyber threats.

Click here to request for this assignment help

#Virtual #Currency #Overview

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

For this assignment, you will review the case study below

For this assignment, you will review the case study below and post a discussion for the class, answering the noted questions. You are evaluating a 78-year-old white male who comes to your office today with unintentional weight loss of 10 lb in the last year, self-reported exhaustion weakness based on

Read the case. Write 5-7 page executive summary on the

Read the case. Write 5-7 page executive summary on the case, including answers to the following questions: What are the main arguments that Sarah is trying to counter? That is what are the reasons and rationalizations she needs to address in deciding how to handle the meeting with Paul Henley?

Ethical Dilemma in Nursing

Week 6 Journal Reflection Examining an Ethical Dilemma Ethical dilemmas occur when there are conflicting moral claims. The “rightness” or “wrongness” of decisions regarding ethical issues is often not clear. Consider a situation where you encountered an ethical dilemma. Describe factors that contributed to your uncertainty about which moral claim

A key component of supervision in a correctional organization is

 A key component of supervision in a correctional organization is that authority and responsibilities must be aligned and assigned for each role or position. Correctional agencies are paramilitary organizations that use the chain of command and span of control within their day-to-day operations. Explain a correction organization’s use of the

Computer Networking and Medical Technology This section requires that you

   Computer Networking and Medical Technology   This section requires that you review at least 5 peer-reviewed literature sources to be used in the research. For each of the 5 articles, write a paragraph each for the following sections o   Description of the research including who the target population was (if

1st person to respond to Deborah, In Chapter 9 of

1st person to respond to Deborah,  In Chapter 9 of The CFO Guidebook, we are introduced to the tools of capital budgeting. Making specific reference to what you read in that chapter, respond to the following questions: Which metrics and methodologies are the most useful when evaluating a capital investment? Why?

Air Pollution health effects on Children

    Pollution health effects on ChildrenHealth effects of ambient air pollution in children Author links open overlay panel SundeepSalvi Show more https://doi.org/10.1016/j.prrv.2007.08.008 Get rights and content   Summary Children seem to be most vulnerable to the harmful effects of ambient air pollutants because their defence mechanisms are still evolving

Research Paper on mobile device attacks

Research and prepare a report on your selected (selection made in Week 2) current trend in the area of IT Security. Prepare a 4-6 page paper in Microsoft Word using approved APA format. (1,000 word minimum) The minimum page count cannot not include your Title page and Reference list. Include

Topic 10 DQ 2 Evidence-based practice is now widely recognized

 Topic 10 DQ 2 Evidence-based practice is now widely recognized as the key to improving healthcare quality and patient outcomes (Chien, 2019). So EBP is an essential component of the practice of a BSN-prepared RN. The BSN curriculum is more focused on EBP and providing high-quality education and skills training

Journal Article Review on Urbanization Effects on Common Blackbirds

 Review of paper should be approximately 3 pages typed, double-spaced (12 pt. font, Times New Roman), with standard 1-inch margins on all sides. The review paper should not only provide a synopsis (“summary”) of the paper. The review paper should also 1) highlight the strengths and weaknesses, if any, of

Week 2 Discussion For this assignment, you must create an

Week 2 Discussion For this assignment, you must create an original post addressing the questions below, preferably prior on Wednesday. Question: Open a web browser and go to the CERT website and review the currently active technology threats.  Summarize your findings and describe how a security department can use these

Humanities in Modern Life: Compile a list of twenty significant

Note: Please make sure all assignment instructions and required points are addressed throughout the assignment. *Use the attached required resources to help identify significant developments and to write this assignment in addition to external credible resources. Requirements • Written communication: Should be free of errors that detract from the overall

SOWK 501 Professionalism Self-Assessment Assignment Instructions Instructions For this assignment, you

SOWK 501 Professionalism Self-Assessment Assignment Instructions Instructions For this assignment, you will complete a self-assessment of your professionalism in regard to the criteria outlined below. You will use the Professionalism Self-Assessment provided under the Professionalism Self-Assessment Resources section located on the assignment page. A self-assessment example will also be provided

John, Lesa, and Trevor form a limited liability company. John

John, Lesa, and Trevor form a limited liability company. John contributes 60 percent of the capital, and Lesa and Trevor each contribute 20 percent. Nothing is decided about how profits will be divided. John assumes that he will be entitled to 60 percent of the profits, in accordance with his

Define the most important capital budgeting techniques. Name at least

  Define the most important capital budgeting techniques. Name at least two capital budgeting techniques (for example, NPV, IRR, Payback Period, et cetera) and describe how they are used to arrive at investment decisions. Respond   Capital budgeting is a process for evaluating investment decisions, which are large in amount

Chapter 9 covers two topics: Transportation and Communication. This week’s

Chapter 9 covers two topics: Transportation and Communication. This week’s assignment discusses communication – specifically the internet. In the past 20 years, mainstream society has integrated with technology. This video asks the simple question, can we now survive without computers, internet, and technology? After reading the chapter and watching the

The Great Resignation”. Please read the attached article and answer

  The Great Resignation”. Please read the attached article and answer the following questions.  How has “The Great Resignation been felt in your organization? Of the seven tips for leaders listed in the article, which three do you think are most important, effective, or impactful? In your opinion, what steps can

discussion Nursing Assignment Help

APA  Managing financial risk is an important responsibility of medical managers. Risk management is an important process to keep the finances of all healthcare organizations safe.  Discuss the following: 1. What are the financial risks to healthcare organizations? 2. What role do the accountants play in risk management? 3. Why is it important to hire