Create the architecture for the bsu coin network

Assignment Help Management Information Sys
Reference no: EM131911415

The capstone project requires you to identify different risk management techniques for the seven domains of IT infrastructure and apply them to the adoption of an Ethereum-based Blockchain implementation called BSU Coin. BSU Coin uses Smart Contracts to create "tokens" that represent campus organizations/clubs, events, internships, employment, awards, activities, and scholarships.

You are tasked with identifying the IT infrastructure to support a public and globally accessible BSU Coin Blockchain. As an IS professional, you need to identify threat/vulnerability pairs and estimate the likelihood of their occurrence. You must decide which risk management (control) techniques are appropriate to manage these risks. You will need to specifically highlight the risks associated with a Blockchain accessible to the public - students, faculty, staff, employers, and key stakeholders. You will be required to create a presentation to senior management so they can allocate resources to prepare for and respond to the identified threats and vulnerabilities appropriately.

Scenario

BSU is an MIS powerhouse in Blockchain and they are looking to leverage the capabilities for Dr. Breaux's Race to Excellence - Student Success, Academic Excellence, and Long-term Viability. Check, Check, and Check for Blockchain... but how?

The solution, BSU Coin!

BSU Coin is an incentive Ethereum-based Blockchain solution that encourages students to collect BSU Coins and BSU Coin-based tokens to demonstrate the breadth, depth, passion, and experience for a student in their domain.

Students will be assigned a "wallet" for their BSU coins and will seek out ways to college coins. Employers will use the BSU Blockchain explorer to identify potential candidates based on the content of their wallets.

Anyone can access the BSU Coin Blockchain. Only users with BSU Coins can create BSU Coin-based tokens. Anyone can host a BSU Coin node.

Tasks

You will need to create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.

Once you have identified the IT infrastructure (consider the seven domains of a typical IT infrastructure), you will identify 20 potential threats/vulnerabilities as a way to thwart concerns about implementing the system campus-wide.

Consider the likelihood of each threat/risk.

Assume the role of advocate as part of the IT advisory board to conduct a thorough risk management assessment.

Develop a Network Diagram

Using the Network Diagram as a current state, highlight potential attack vectors (10 vectors)

Identify 20 potential threats/vulnerabilities

Determine which of the six risk management techniques is appropriate for each risk explained above.

Justify your reasoning for each chosen management technique

Prepare a report using the APA format to support your findings and perspective for senior management incorporating all of the required materials for steps 1-5. You will need to wrap these items in a supportive narrative.

The report should consist of an additional 2 pages (12-point Arial font, 1.5 line spacing) to support your findings.

Prepare a 15-slide presentation to summarize your findings

Include a road map, high-level summary, Gantt chart, and relevant supporting material

Reference no: EM131911415

Questions Cloud

History of labor unions in the united states : Trace the early history of labor unions in the United States, and mention their significant contributions.
Discuss the role of the board of directors : Discuss the role of the Board of Directors, the Risk Committee, the Audit Committee, and their relationship to each other in organizational governance.
Research policies for each affected it infrastructure domain : Research policies for each affected IT infrastructure domain. Write descriptions for policies that affect server, mainframe, and RSA user access?
Should inventory be evaluated for impairment : Case - Three Little Pigs, Inc. Should inventory be evaluated for impairment under the lower of cost or market method on a total inventory basis
Create the architecture for the bsu coin network : Create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.
Calculate swansons net income or loss for march : As of March 11, 2013, Swanson Group, Ltd. had 300,000 shares of $10 par value common stock authorized. Calculate Swanson's net income or loss for March.
Examining the ethical responsibilities of employers : An evaluation of the main concepts with a focus on their application to management practice and their impact on positive social change.
Determine the break-even point in units and dollars : Determine the break-even point in units and dollars using each of the following approaches: Use the equation method
How may the concepts in human resouce course : How may the concepts in human resouce course be applied to real-world situations and increase a person chances of career or life success?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Brain saving technologies

Read the Real World Case: Brain Saving Technologies, Inc. and the T-Health Institute: Medicine through Videoconferencing

  Create an entity relationship diagram using uml notation

Create an Entity Relationship diagram using UML notation. To receive full credit for this assignment, your diagram must be well organized and include: A state-wide toll road system (MyStateTolls) allows users to buy an RF tag for use in paying toll..

  Explain the major privacy issues facing organizations today

Describe the major privacy issues facing organizations today. Analyze the major privacy issues described above and compare that to the potential privacy risks facing the sporting goods store.

  Assess the damage to the affected location

Disaster declared: Mobilize incident response/Technical services teams/Report to command center.Assess the damage to the affected location

  What are the advantages of easily obtainable information

What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media? What are the advantages and disadvantages of easily obtainable information?

  Business process re-engineering in the real worldprovide an

business process re-engineering in the real worldprovide an example of a real-world situation where business process

  Provide a history of the concept that you have chosen

Explain the fundamental strengths and weaknesses--or the advantages and disadvantages--of the concept that you have chosen.

  How improve global cooperation to respond to cybersecurity

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. Af..

  Describe the various outcomes that might occur in an area

Why would a "search company" such as Google decided to enter the fiber services business? Describe the benefits that Google expects to obtain from this venture.

  Describe stack trace

Describe stack trace.Identify the information that hackers can obtain through error messages.

  What is the privacy policy of the organization

How does the organization organize its internal and external communication? What is the age of the organization? What is the organizational structure?

  System architecture and emerging technology benefitsexplain

system architecture and emerging technology benefitsexplain the importance of system architecture emerging technology

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd