Create the architecture for the bsu coin network

Assignment Help Management Information Sys
Reference no: EM131911415

The capstone project requires you to identify different risk management techniques for the seven domains of IT infrastructure and apply them to the adoption of an Ethereum-based Blockchain implementation called BSU Coin. BSU Coin uses Smart Contracts to create "tokens" that represent campus organizations/clubs, events, internships, employment, awards, activities, and scholarships.

You are tasked with identifying the IT infrastructure to support a public and globally accessible BSU Coin Blockchain. As an IS professional, you need to identify threat/vulnerability pairs and estimate the likelihood of their occurrence. You must decide which risk management (control) techniques are appropriate to manage these risks. You will need to specifically highlight the risks associated with a Blockchain accessible to the public - students, faculty, staff, employers, and key stakeholders. You will be required to create a presentation to senior management so they can allocate resources to prepare for and respond to the identified threats and vulnerabilities appropriately.

Scenario

BSU is an MIS powerhouse in Blockchain and they are looking to leverage the capabilities for Dr. Breaux's Race to Excellence - Student Success, Academic Excellence, and Long-term Viability. Check, Check, and Check for Blockchain... but how?

The solution, BSU Coin!

BSU Coin is an incentive Ethereum-based Blockchain solution that encourages students to collect BSU Coins and BSU Coin-based tokens to demonstrate the breadth, depth, passion, and experience for a student in their domain.

Students will be assigned a "wallet" for their BSU coins and will seek out ways to college coins. Employers will use the BSU Blockchain explorer to identify potential candidates based on the content of their wallets.

Anyone can access the BSU Coin Blockchain. Only users with BSU Coins can create BSU Coin-based tokens. Anyone can host a BSU Coin node.

Tasks

You will need to create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.

Once you have identified the IT infrastructure (consider the seven domains of a typical IT infrastructure), you will identify 20 potential threats/vulnerabilities as a way to thwart concerns about implementing the system campus-wide.

Consider the likelihood of each threat/risk.

Assume the role of advocate as part of the IT advisory board to conduct a thorough risk management assessment.

Develop a Network Diagram

Using the Network Diagram as a current state, highlight potential attack vectors (10 vectors)

Identify 20 potential threats/vulnerabilities

Determine which of the six risk management techniques is appropriate for each risk explained above.

Justify your reasoning for each chosen management technique

Prepare a report using the APA format to support your findings and perspective for senior management incorporating all of the required materials for steps 1-5. You will need to wrap these items in a supportive narrative.

The report should consist of an additional 2 pages (12-point Arial font, 1.5 line spacing) to support your findings.

Prepare a 15-slide presentation to summarize your findings

Include a road map, high-level summary, Gantt chart, and relevant supporting material

Reference no: EM131911415

Questions Cloud

History of labor unions in the united states : Trace the early history of labor unions in the United States, and mention their significant contributions.
Discuss the role of the board of directors : Discuss the role of the Board of Directors, the Risk Committee, the Audit Committee, and their relationship to each other in organizational governance.
Research policies for each affected it infrastructure domain : Research policies for each affected IT infrastructure domain. Write descriptions for policies that affect server, mainframe, and RSA user access?
Should inventory be evaluated for impairment : Case - Three Little Pigs, Inc. Should inventory be evaluated for impairment under the lower of cost or market method on a total inventory basis
Create the architecture for the bsu coin network : Create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.
Calculate swansons net income or loss for march : As of March 11, 2013, Swanson Group, Ltd. had 300,000 shares of $10 par value common stock authorized. Calculate Swanson's net income or loss for March.
Examining the ethical responsibilities of employers : An evaluation of the main concepts with a focus on their application to management practice and their impact on positive social change.
Determine the break-even point in units and dollars : Determine the break-even point in units and dollars using each of the following approaches: Use the equation method
How may the concepts in human resouce course : How may the concepts in human resouce course be applied to real-world situations and increase a person chances of career or life success?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd