Categories
Writers Solution

Virtual Currency Applicability

Project 3: Virtual Currency

Start Here

Transcript

Virtual Currency Applicability

As the exploration of emerging technologies continues within cybersecurity, your third of four projects investigates the phenomenon of virtual currency. The assignment should take about 22 days to complete and consists of 12 steps that will guide you toward a Virtual Currency Applicability Report.

This report and accompanying formal business presentation should include research, supporting documentation, and recommendations for financial and cyber policy perspectives. Proceed to Step 1 and contact your CIO (the instructor) if you have questions or need additional guidance.

Competencies

Your work will be evaluated using the competencies listed below.

• 1.6: Follow conventions of Standard Written English.

• 5.4: Define and appropriately use advanced cybersecurity concepts and terminology.

• 8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.

Step 1: Examine the Terms Virtual and Digital Currency

The concepts of virtual currency and digital currency can be difficult to comprehend. Since the financial industry is generally founded on physical assets, the thought of conducting business in a medium that cannot be carried in your pocket or put in a safe is unnerving. The underlying concerns are the standards by which the currency is measured.

Consider the characteristics of virtual currency and digital currency, and how they compare to one another. Additionally, think about these in regard to the context of virtualization and cloud computing. Remember that you must include technical content within your final report, but it is also important to be prepared to provide less technical explanations to decision makers, especially in the executive summary, conclusion, and the recommendations you provide. Once you are comfortable with these terms, consider these and their relationship to one another throughout the project and proceed to the next step, in which you will research virtual currency.

Step 2: Conduct Competitive Research of Virtual Currency

Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution’s cybersecurity policy requirements.

Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.

Proceed to the next step, in which you will take a look at virtualization and cloud computing, specifically the policy constraints of those elements.

Step 3: Identify Policy Constraints on Virtualization and Cloud Computing

You assessed cybersecurity technologies during your competitive research of virtual currency in the previous step. Now, take these technological elements and consider the policies that include aspects of virtualization and cloud computing. Consider the cybersecurity policies and constraints that affect these specific elements.

Make a fourth column in the spreadsheet for policy constraints and document the findings. Once this is completed, proceed to the next step, in which you will compile those findings.

Step 4: Summarize Virtual Currency Findings

In the previous step, you identified the technological elements of virtualization and cloud computing, and now it’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business.

Provide a two- to three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.

Submit the Virtual Currency Overview, along with the spreadsheet of the recorded findings as an addendum for feedback, and proceed to the next step.

Submission for Project 3: Virtual Currency Overview

Previous submissions

0

Drop files here, or click below.

Step 5: Assess Bitcoin Encryption (Blockchain) and Technological Capabilities

Bitcoin has become a successful globally appropriated form of virtual currency and digital currency (cryptocurrency) through its accomplished technology and practices. By many, it is still considered an emerging technology in the realm of cybersecurity.

Within the first few steps, you reviewed virtual currency and gained an overview of cybersecurity methods such as encryption methods and other technology traits associated with various virtual currencies. In the next few steps, you will investigate the cross-cutting effects in Bitcoin’s use of blockchain technology and perform an external Bitcoin and Blockchain Technology Audit for your company. You will scrutinize policy, budget, and technological capabilities (where they exist) to address cyberthreats, as well as how these effects are managed at the enterprise, national, and international levels. Feel free to pull items from your findings thus far to frame this assignment.

In this step, develop a record-keeping system specifically for blockchain. This can be in the form of a table, spreadsheet, or other format. Keep in mind that this will be submitted as an addendum to the final project, so it should be organized and easily understood by the instructor.

Determine variances from a cybersecurity perspective, consider Bitcoin’s encryption method, and other technological capabilities at the enterprise, national, and international level. Include other virtual currency technologies and reasons why they might have a better impact in these areas.

In the next step, you will determine any policy limitations of the use of blockchain technology.

Step 6: Determine Policy Limitations of Blockchain and Similar Technologies

As CISO, you direct the focus of the research into blockchain as the underlying encryption technology to the dominant virtual currency—Bitcoin. As you have learned, emerging alternatives tend to have a disruptive effect on current technology. Blockchain and other options would be expected to have similar results.

In this step, continue the comprehensive review of blockchain and related technologies regarding policy impacts. Review limitations which might be imposed or might involve other business affairs in the company’s cybersecurity arsenal. This should also include the perspective at the enterprise, national, and international levels.

Next, you will consider budget and resources for blockchain.

Step 7: Assess Blockchain Technology Budget and Resource Trade-Offs

In the last two steps, you have considered policy and technology capability impacts of blockchain and related technologies viewed from enterprise, national, and international levels. As you probably have found or predicted, budget and resource trade-offs now need to be acknowledged and will be the final piece of your External Bitcoin and Blockchain Technology Audit. This should also recognize and accommodate potential enterprise, national, and international constraints.

Provide a three- to five-page External Bitcoin and Blockchain Technology Audit. Incorporate what you have identified during your cross-functional analysis of blockchain and digital-currency technology alternatives in regards to technological capabilities, policy, and budget trade-offs relative to enterprise, national, and international restrictions. This should be directed to senior leaders about the pros and cons, the options, and the alternatives that would facilitate their strategic decision making in defense of cyberthreats.

Submit the External Bitcoin and Blockchain Technology Audit along with the recorded findings document as an addendum for feedback.

Submission for Project 3: External Bitcoin and Block-Chain Technology Audit

Previous submissions

0

Drop files here, or click below.

Add Files

Next, you will consider the risks involved with virtual currency.

Step 8: Analyze the Risk Implications of Virtual Currency

Based on what you have learned about risk management, dust off your competitive research spreadsheet, add a final column, and address the cybersecurity risk in each alternative and how to manage it. Address the application of virtual currency and encryption to other aspects of the institution’s cybersecurity. Where do they fit?

Virtual currency could expand the attack vectors of cyber criminals. Include information on this expansion of cyberattack technologies.

Summarize the risk implications that were found during your research in a one-page summary for the category of risk from your research. The next step will focus on managing the potential risks.

Step 9: Classify Technical and Policy Risks

As you better define the information to be delivered in the final report, the Virtual Currency Applicability Report, you recognize the need to distinguish between the technology and policy issues that are involved. As an update to your ongoing analysis, categorize the risk as technical or policy.

The classification is based on risk, not the solution. In other words, you might have documented what appears to be a technical condition or change that actually triggers a policy risk. As such, for the purpose of this reporting, it would be classified on the policy risk side of the ledger.

Record the findings and proceed to the next step, in which you will come up with a strategy to mitigate risk.

Step 10: Develop a Virtual Currency Risk Mitigation Strategy

Now that you have categorized the risks, it’s time to consider risk management for virtual currency. Begin the process of addressing those risks from a strategic response perspective. What direction will be taken in the event of one or more of the identified risks occurring?

This brief, two- to three-page report is an integral part of the Virtual Currency Applicability Report. It is not intended as a play-by-play procedures manual in the event of a breach. It is intended, as is the final report, as an overview of a strategic response should risk mitigation be required.

Submit the Virtual Currency Risk Mitigation Strategy for approval and proceed to the final series of steps to complete the Virtual Currency Applicability Report.

Submission for Project 3: Risk Mitigation Strategy

Previous submissions

0

Drop files here, or click below.

Step 11: Compose Formal Presentation Elements

The next two steps will prepare you for the final submission of the Digital Currency Applicability Report. By now, you should have received feedback from the first three assignments.

To present this as a formal document to stakeholders, additional elements should be present in the final Virtual Currency Applicability Report. The table of contents should easily reflect both the submitted work and supplemental materials.

You should also provide an executive overview to set the stage and address concerns expressed and implied by the assignment. This will provide senior leadership streamlined information that you have found during the cybersecurity review of virtual currency and related concerns. This should include future opportunities and risks.

Finally, an abridged conclusion should be prepared for the mitigation.

It is now time to move to production of the final Virtual Currency Applicability Report.

Step 12: Construct the Virtual Currency Applicability Report and Recommendations

The final assignment for the project is the Virtual Currency Applicability Report. The completed report should be 12 to 15 pages.

Organize the report with a table of contents, executive overview, and conclusion. Also include the three assignments for this project and other supplementary materials as addendums.

Finally, provide recommendations on other issues that may have yet to be addressed. As the CISO, the primary issue and area of expertise is cybersecurity. Senior leadership is likely going to want answers to several questions, such as:

• Can we use an encryption technology without virtual currency?

• Has a cost-benefit analysis been conducted?

• What would be the impact on our customers?

As you can see, the concerns are not simply technical. The decision includes financial and policy questions that must be addressed. The presentation should provide a strategic approach to addressing these concerns based on the research and CIO feedback.

Submit the Virtual Currency Applicability Report.

Submission for Project 3: Supporting Documents

Previous submissions

0

Drop files here, or click below.

Add Files

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

• 1.6: Follow conventions of Standard Written English.

• 5.4: Define and appropriately use advanced cybersecurity concepts and terminology.

• 8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.

Submission for Project 3: Virtual Currency Applicability Report

Previous submissions

0

Drop files here, or click below.Hide Files: Project 3 CMP 640.docx

GET YOUR EXPERT ANSWER ON STUDYDADDY

Post your own question and get a custom answerGET ANSWER

Related Questions: