Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The capstone project requires you to identify different risk management techniques for the seven domains of IT infrastructure and apply them to the adoption of an Ethereum-based Blockchain implementation called BSU Coin. BSU Coin uses Smart Contracts to create "tokens" that represent campus organizations/clubs, events, internships, employment, awards, activities, and scholarships.

You are tasked with identifying the IT infrastructure to support a public and globally accessible BSU Coin Blockchain. As an IS professional, you need to identify threat/vulnerability pairs and estimate the likelihood of their occurrence. You must decide which risk management (control) techniques are appropriate to manage these risks. You will need to specifically highlight the risks associated with a Blockchain accessible to the public - students, faculty, staff, employers, and key stakeholders. You will be required to create a presentation to senior management so they can allocate resources to prepare for and respond to the identified threats and vulnerabilities appropriately.

Scenario

BSU is an MIS powerhouse in Blockchain and they are looking to leverage the capabilities for Dr. Breaux's Race to Excellence - Student Success, Academic Excellence, and Long-term Viability. Check, Check, and Check for Blockchain... but how?

The solution, BSU Coin!

BSU Coin is an incentive Ethereum-based Blockchain solution that encourages students to collect BSU Coins and BSU Coin-based tokens to demonstrate the breadth, depth, passion, and experience for a student in their domain.

Students will be assigned a "wallet" for their BSU coins and will seek out ways to college coins. Employers will use the BSU Blockchain explorer to identify potential candidates based on the content of their wallets.

Anyone can access the BSU Coin Blockchain. Only users with BSU Coins can create BSU Coin-based tokens. Anyone can host a BSU Coin node.

Tasks

You will need to create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.

Once you have identified the IT infrastructure (consider the seven domains of a typical IT infrastructure), you will identify 20 potential threats/vulnerabilities as a way to thwart concerns about implementing the system campus-wide.

Consider the likelihood of each threat/risk.

Assume the role of advocate as part of the IT advisory board to conduct a thorough risk management assessment.

Develop a Network Diagram

Using the Network Diagram as a current state, highlight potential attack vectors (10 vectors)

Identify 20 potential threats/vulnerabilities

Determine which of the six risk management techniques is appropriate for each risk explained above.

Justify your reasoning for each chosen management technique

Prepare a report using the APA format to support your findings and perspective for senior management incorporating all of the required materials for steps 1-5. You will need to wrap these items in a supportive narrative.

The report should consist of an additional 2 pages (12-point Arial font, 1.5 line spacing) to support your findings.

Prepare a 15-slide presentation to summarize your findings

Include a road map, high-level summary, Gantt chart, and relevant supporting material

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92750081
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Management Information System

Answer the following question 1 why is it important for hr

Answer the following Question : 1. Why is it important for HR management to transform from being primarily administrative and operational to a more strategic contributor? (400 words) 2. Discuss how globalization has chan ...

Answer the following questions 1 discuss in 500 words how

Answer the following Questions : 1) Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger ...

Question research the fire at the federal aviation

Question : Research the fire at the Federal Aviation Administration (FAA) facility in Chicago, Illinois (2014). Provide insight into the following: What went wrong? What went right? Would a risk assessment strategy if em ...

Choose your roadmap to certification part 2 federal

Choose Your Roadmap to Certification Part 2: Federal Information Security Modernization Act (FISMA) Compliance In this assignment, students will review the federal work sector requirements and executives/organizations pr ...

In this assessment you will design and code a java console

In this assessment, you will design and code a Java console application that reads in seven integer values and prints out the number of occurrences of each value. The application uses the Java single dimension array cons ...

Assignmentsuppose you were recently hired for a new

Assignment Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on you ...

Answer the following question why is it important for hr

Answer the following Question : Why is it important for HR management to transform from being primarily administrative and operational to a more strategic contributor? Your discussion is to be submitted in 12-point Times ...

Assignmentyou are still the project manager for the

Assignment You are still the project manager for the computer upgrades. Briefly describe the four 4 risks you identified in Unit 2's Individual Project. Using the risk assessment techniques, describe your assessment deci ...

Question 1 please post the hyperlink to one federal statute

Question : 1. Please post the hyperlink to one federal statute which discusses cybercrime on the internet and summarize in not less than 100 words what that statute accomplishes. 2. Please post the hyperlink to one feder ...

Qestion write on any topic related to technology security

Question : Write on any topic related to technology security - 11 Pages and 5 References Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies 1- 2 pages with References Explain ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As