Categories
Writers Solution

Briefly assess relevance/applicability of the concepts of the article in both overall business settings and personal work settings.

 Choose a 10-12-page article not including references . The article must come from an Academic journal. It In your Article Review you should describe the content of the article chosen, identifying key

Choose a 10-12-page article not including references . The article must come from an Academic journal. It

In your Article Review you should describe the content of the article chosen, identifying key assumptions and conclusions of the authors and giving your opinion on them. Your analysis should lead to a justified conclusion: whether you will recommend this article to your colleagues and classmates or not and why. You also need to briefly assess relevance/applicability of the concepts of the article in both overall business settings and personal work settings.

Requirements:

● Your Article Review should be no less than 1000 words using APA.

References

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Briefly assess relevance/applicability of the concepts of the article in both overall business settings and personal work settings.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
Categories
Writers Solution

Virtual Currency Applicability

Project 3: Virtual Currency

Start Here

Transcript

Virtual Currency Applicability

As the exploration of emerging technologies continues within cybersecurity, your third of four projects investigates the phenomenon of virtual currency. The assignment should take about 22 days to complete and consists of 12 steps that will guide you toward a Virtual Currency Applicability Report.

This report and accompanying formal business presentation should include research, supporting documentation, and recommendations for financial and cyber policy perspectives. Proceed to Step 1 and contact your CIO (the instructor) if you have questions or need additional guidance.

Competencies

Your work will be evaluated using the competencies listed below.

• 1.6: Follow conventions of Standard Written English.

• 5.4: Define and appropriately use advanced cybersecurity concepts and terminology.

• 8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.

Step 1: Examine the Terms Virtual and Digital Currency

The concepts of virtual currency and digital currency can be difficult to comprehend. Since the financial industry is generally founded on physical assets, the thought of conducting business in a medium that cannot be carried in your pocket or put in a safe is unnerving. The underlying concerns are the standards by which the currency is measured.

Consider the characteristics of virtual currency and digital currency, and how they compare to one another. Additionally, think about these in regard to the context of virtualization and cloud computing. Remember that you must include technical content within your final report, but it is also important to be prepared to provide less technical explanations to decision makers, especially in the executive summary, conclusion, and the recommendations you provide. Once you are comfortable with these terms, consider these and their relationship to one another throughout the project and proceed to the next step, in which you will research virtual currency.

Step 2: Conduct Competitive Research of Virtual Currency

Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution’s cybersecurity policy requirements.

Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.

Proceed to the next step, in which you will take a look at virtualization and cloud computing, specifically the policy constraints of those elements.

Step 3: Identify Policy Constraints on Virtualization and Cloud Computing

You assessed cybersecurity technologies during your competitive research of virtual currency in the previous step. Now, take these technological elements and consider the policies that include aspects of virtualization and cloud computing. Consider the cybersecurity policies and constraints that affect these specific elements.

Make a fourth column in the spreadsheet for policy constraints and document the findings. Once this is completed, proceed to the next step, in which you will compile those findings.

Step 4: Summarize Virtual Currency Findings

In the previous step, you identified the technological elements of virtualization and cloud computing, and now it’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business.

Provide a two- to three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.

Submit the Virtual Currency Overview, along with the spreadsheet of the recorded findings as an addendum for feedback, and proceed to the next step.

Submission for Project 3: Virtual Currency Overview

Previous submissions

0

Drop files here, or click below.

Step 5: Assess Bitcoin Encryption (Blockchain) and Technological Capabilities

Bitcoin has become a successful globally appropriated form of virtual currency and digital currency (cryptocurrency) through its accomplished technology and practices. By many, it is still considered an emerging technology in the realm of cybersecurity.

Within the first few steps, you reviewed virtual currency and gained an overview of cybersecurity methods such as encryption methods and other technology traits associated with various virtual currencies. In the next few steps, you will investigate the cross-cutting effects in Bitcoin’s use of blockchain technology and perform an external Bitcoin and Blockchain Technology Audit for your company. You will scrutinize policy, budget, and technological capabilities (where they exist) to address cyberthreats, as well as how these effects are managed at the enterprise, national, and international levels. Feel free to pull items from your findings thus far to frame this assignment.

In this step, develop a record-keeping system specifically for blockchain. This can be in the form of a table, spreadsheet, or other format. Keep in mind that this will be submitted as an addendum to the final project, so it should be organized and easily understood by the instructor.

Determine variances from a cybersecurity perspective, consider Bitcoin’s encryption method, and other technological capabilities at the enterprise, national, and international level. Include other virtual currency technologies and reasons why they might have a better impact in these areas.

In the next step, you will determine any policy limitations of the use of blockchain technology.

Step 6: Determine Policy Limitations of Blockchain and Similar Technologies

As CISO, you direct the focus of the research into blockchain as the underlying encryption technology to the dominant virtual currency—Bitcoin. As you have learned, emerging alternatives tend to have a disruptive effect on current technology. Blockchain and other options would be expected to have similar results.

In this step, continue the comprehensive review of blockchain and related technologies regarding policy impacts. Review limitations which might be imposed or might involve other business affairs in the company’s cybersecurity arsenal. This should also include the perspective at the enterprise, national, and international levels.

Next, you will consider budget and resources for blockchain.

Step 7: Assess Blockchain Technology Budget and Resource Trade-Offs

In the last two steps, you have considered policy and technology capability impacts of blockchain and related technologies viewed from enterprise, national, and international levels. As you probably have found or predicted, budget and resource trade-offs now need to be acknowledged and will be the final piece of your External Bitcoin and Blockchain Technology Audit. This should also recognize and accommodate potential enterprise, national, and international constraints.

Provide a three- to five-page External Bitcoin and Blockchain Technology Audit. Incorporate what you have identified during your cross-functional analysis of blockchain and digital-currency technology alternatives in regards to technological capabilities, policy, and budget trade-offs relative to enterprise, national, and international restrictions. This should be directed to senior leaders about the pros and cons, the options, and the alternatives that would facilitate their strategic decision making in defense of cyberthreats.

Submit the External Bitcoin and Blockchain Technology Audit along with the recorded findings document as an addendum for feedback.

Submission for Project 3: External Bitcoin and Block-Chain Technology Audit

Previous submissions

0

Drop files here, or click below.

Add Files

Next, you will consider the risks involved with virtual currency.

Step 8: Analyze the Risk Implications of Virtual Currency

Based on what you have learned about risk management, dust off your competitive research spreadsheet, add a final column, and address the cybersecurity risk in each alternative and how to manage it. Address the application of virtual currency and encryption to other aspects of the institution’s cybersecurity. Where do they fit?

Virtual currency could expand the attack vectors of cyber criminals. Include information on this expansion of cyberattack technologies.

Summarize the risk implications that were found during your research in a one-page summary for the category of risk from your research. The next step will focus on managing the potential risks.

Step 9: Classify Technical and Policy Risks

As you better define the information to be delivered in the final report, the Virtual Currency Applicability Report, you recognize the need to distinguish between the technology and policy issues that are involved. As an update to your ongoing analysis, categorize the risk as technical or policy.

The classification is based on risk, not the solution. In other words, you might have documented what appears to be a technical condition or change that actually triggers a policy risk. As such, for the purpose of this reporting, it would be classified on the policy risk side of the ledger.

Record the findings and proceed to the next step, in which you will come up with a strategy to mitigate risk.

Step 10: Develop a Virtual Currency Risk Mitigation Strategy

Now that you have categorized the risks, it’s time to consider risk management for virtual currency. Begin the process of addressing those risks from a strategic response perspective. What direction will be taken in the event of one or more of the identified risks occurring?

This brief, two- to three-page report is an integral part of the Virtual Currency Applicability Report. It is not intended as a play-by-play procedures manual in the event of a breach. It is intended, as is the final report, as an overview of a strategic response should risk mitigation be required.

Submit the Virtual Currency Risk Mitigation Strategy for approval and proceed to the final series of steps to complete the Virtual Currency Applicability Report.

Submission for Project 3: Risk Mitigation Strategy

Previous submissions

0

Drop files here, or click below.

Step 11: Compose Formal Presentation Elements

The next two steps will prepare you for the final submission of the Digital Currency Applicability Report. By now, you should have received feedback from the first three assignments.

To present this as a formal document to stakeholders, additional elements should be present in the final Virtual Currency Applicability Report. The table of contents should easily reflect both the submitted work and supplemental materials.

You should also provide an executive overview to set the stage and address concerns expressed and implied by the assignment. This will provide senior leadership streamlined information that you have found during the cybersecurity review of virtual currency and related concerns. This should include future opportunities and risks.

Finally, an abridged conclusion should be prepared for the mitigation.

It is now time to move to production of the final Virtual Currency Applicability Report.

Step 12: Construct the Virtual Currency Applicability Report and Recommendations

The final assignment for the project is the Virtual Currency Applicability Report. The completed report should be 12 to 15 pages.

Organize the report with a table of contents, executive overview, and conclusion. Also include the three assignments for this project and other supplementary materials as addendums.

Finally, provide recommendations on other issues that may have yet to be addressed. As the CISO, the primary issue and area of expertise is cybersecurity. Senior leadership is likely going to want answers to several questions, such as:

• Can we use an encryption technology without virtual currency?

• Has a cost-benefit analysis been conducted?

• What would be the impact on our customers?

As you can see, the concerns are not simply technical. The decision includes financial and policy questions that must be addressed. The presentation should provide a strategic approach to addressing these concerns based on the research and CIO feedback.

Submit the Virtual Currency Applicability Report.

Submission for Project 3: Supporting Documents

Previous submissions

0

Drop files here, or click below.

Add Files

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

• 1.6: Follow conventions of Standard Written English.

• 5.4: Define and appropriately use advanced cybersecurity concepts and terminology.

• 8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.

Submission for Project 3: Virtual Currency Applicability Report

Previous submissions

0

Drop files here, or click below.Hide Files: Project 3 CMP 640.docx

GET YOUR EXPERT ANSWER ON STUDYDADDY

Post your own question and get a custom answerGET ANSWER

Related Questions:

Categories
Writers Solution

opportunity to apply your knowledge for a real data set in order to understand the applicability of all the Statistical tools

For your Final Paper,  you will have the opportunity to apply your knowledge for a real data set in order to understand the applicability of all the Statistical tools learned in this course.

Attached is a dataset that lists estimates of the percentage of body fat determined by underwater weighing and various body circumference measurements for 252 men from K.W. Penrose, A.G. Nelson, A.G. Fisher, FACSM, Human Performance Research Center, Brigham Young University, Provo, Utah 84602 as listed in Medicine and Science in Sports and Exercise, vol. 17, no. 2, April 1985, p. 189.

Some experts claim BMI (Body Mass Index) as the most accurate and simple way to determine the effect of weight on your health. Meanwhile, in September 2000, the American Journal of Clinical Nutrition published a study showing that body-fat percentage may be a better measure of your risk of weight-related diseases than BMI.

An important question that arises is whether there is a relationship between ‘Body Fat Percentage’ and ‘Body Mass Index’ as a predictor.

Body Mass Index is defined as 

With the use of the statistical techniques used in this programme (especially simple linear regression), explain whether BMI can be used to explain the Body Fat percentage for an individual based on the dataset provided. Clearly explain and interpret your results.

  • Use introduction, body paragraph, and conclusion headings
  • Your paper should have 1,500 words maximum
  • At least 5 references of an academic or scholarly source are required for this paper.  You are expected to use academic sources in peer-reviewed databases or Internet sources, such as: “.org”, “.edu”, “.mil”, “.gov”, “.zm”  Sources not allowed are Dictionaries, wikis, or blogs.
  • Use APA, writing style for in-text citations, and each reference source that you use.  Remember, all wording that is not your own must be cited.
  • Limit the use of direct quotes. Direct quotes should not exceed 1/4 page in total.  Deductions will result if this rule is violated.
  • The cover sheet should include name and course information
  • Include a reference page in APA style

You can access the file by clicking the link below:

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. opportunity to apply your knowledge for a real data set in order to understand the applicability of all the Statistical tools

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays