Discuss blockchain tech & cryptocurrency relationship

Assignment Help Computer Network Security
Reference no: EM133209316

Assignment:

Blockchain Tech & Cryptocurrency relationship

  • Blockchain technology is a digital ledger that provides the recordkeeping for cryptocurrency and other types of digital exchanges.
  • Cryptocurrency is a digital currency that is secure by cryptography (code).
  • Blockchain works together with Cryptocurrency by tracking, recording, and verifying transactions.
  • Cryptocurrency is available to anyone through a relatively simple sign-up process; nearly impossible to counterfeit and double spend (digital currency that is spent twice).
  • Blockchain is the bank statement and Cryptocurrency are actual funds available/spent such as by use of a Debit/Credit card.

Cryptocurrency technologies appropriate for the distributor

  • Bitcoin most used cryptocurrency one of the most popular on the market; due to its fast-processing speeds.
  • Litecoin consists of shorter transaction times, lower fees, and more concentrated miners. Stellar (XLM) is an open blockchain network designed to handle large transactions; extremely cost efficient and no need for middleman.
  • Chain-link is a decentralized oracle network that bridges the gap between smart contracts; Blockchains alone do not have ability to connect outside contracts in a secure manner.

Blockchain and Cryptocurrencies' competitive advantage for distributor

  • Better data management: the biggest competitive advantage of adopting blockchain tech is a sophisticated data management system.
  • Higher security: Implementing Blockchain tech reducing cyber threats and a substantial level.
  • Boosting Efficiently: businesses can boost their productivity & operating efficiency to do much more work in much less time.
  • Automated payments, document verification, and data management.

Risks associated accepting cryptocurrency

  • No regulation by government or industry
  • No insurance
  • Poor public reputation of cryptocurrency
  • No records because of anonymous transactions
  • Anonymity of customers
  • Theft from hacking, phishing, spoofing, and social engineering

Recommendation For Stakeholders

  • I recommend the stakeholders deny the use of cryptocurrency; the enterprise should use a third party by purchasing insurance (ex: FDIC banks use) for protection of the investments adding another expense for the enterprise.
  • Customers can be anonymous in the world of cryptocurrency, transactions/transfers of monies cannot be traced. Extremely risky as the value of the company (cryptocurrency) can increase and decrease as value of investments change due to market fluctuations.
  • Businesses are typically victims of phishing, spoofing, or social engineering.
  • The competitive advantages outweigh the risk for the company when implementing cryptocurrency as part of the business model.

Reference no: EM133209316

Questions Cloud

Create columns to determine a recommendation : Create columns to determine a recommendation using each of the following criteria: (i) expected value, (ii) pessimism, (iii) optimism
Examine the structure of industrys impact on your company : Examine the structure of industrys impact on your company and industry-level performance and Analyze the five competitive forces that shape your business
Describe three common types of routine requests : Describe three common types of routine requests. Outline an effective strategy for writing routine replies and positive messages
Illustrate the differentiating aspects of your product : Describes the products and/or services you offer. This is true even if you have an established business because the readers may not be familiar with your
Discuss blockchain tech & cryptocurrency relationship : Blockchain technology is a digital ledger that provides the recordkeeping for cryptocurrency and other types of digital exchanges.
What is your initial response to the video : Watch the Ted Talk by Jon Ronson about the Justine Sacco case entitled "How One Tweet Can Ruin Your Life." What is your initial response to the video
What should you take into account when determining best fit : What should you take into account when determining the best fit? Why may you need to work collaboratively the person during this progress
Identify an impact on the healthcare organizations : Identify a technology that is having an impact on the healthcare organizations.
Write a script on an important, transformative life event : Write a 400-500-word script (autobiography) on an important, transformative life event that happened to you. Which event stands out the most in your mind

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd