Blockchain Technology & Security Discussion

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Blockchain Implementation Project Plan Case Study

Blockchain Implementation Project plan Every project that has a reasonable chance at success starts with a solid plan.

you will create a Project to implement a newly developed blockchain application. The first step in this assignment is to describe your organization’s environment and blockchain application. You can choose a consumer-based or enterprise application environment. Each one has its own environmental concerns. Once you describe your organization and blockchain application environment, you will provide the abbreviated project plan. (A real project plan will include detailed schedule, budget, procurement, and other supporting plans. This project won’t require all components of a real-life project plan.) You abbreviated project plan (with organizational and blockchain environment introduction) must be no less than 1500 words.

Your paper must be in proper APA format, including proper in-text citations and end references for any external sources you use.

No more than 10% of this paper may originate from external sources.

This isn’t a research paper – it is a project plan. Your paper must start with the following sections. Organizational overview – Introduce your organization (it can be fictitious). Describe what your organization does, how it defines success, what services or products it produces, and why it decided to venture into blockchain technology. Then describe the specific goals blockchain technology must meet to be deemed a success.

• Blockchain environment overview – Describe the type of blockchain your organization has decided to implement and why. Explain how your chosen blockchain implementation is the best choice for your organization’s goals and capabilities, and how your organization participates in your chosen blockchain network’s governance. Here are the sections your project plan must include:

• Project overview – Within the context of an organization and blockchain environment (described in the first 2 sections of your paper), provide an overview of this project.

What application are you implementing? (Describe a novel blockchain application that derives value from blockchain technology. Explain why blockchain technology is required for your application to operate.) This section should include a description of what application you are implementing, and how you define success for your project.

• Project charter – The high-level initial project document necessary to gain approval and funding (includes the following) o Reasons for engaging in this project (Why do you want to implement this application?)

o Project objectives

o Project constraints

o Project stakeholders

o Project scope

o Project risks (Include scalability, compliance, and security)

o Project benefits

o Project cost (Provide reasonable estimates of personnel and infrastructure cost to accomplish what you’re proposing.)

• Deliverables – a list (with descriptions) of artifacts to be delivered to the customer (defined in stakeholders above) at the end of the project

• Critical success factors – What criteria will customers use to determine whether the deliverables are acceptable?

• Work Breakdown Structure – What steps are necessary to take your application from a development environment to a deployed and operating environment? This section demonstrates an understanding of the implementation process. Provide a description, along with details, of tasks necessary to deploy a blockchain application and make it available for end users. You don’t need to provide specific commands or details but describe the process in enough detail that your technical staff could create procedures from your plan.

• Quality plan – Describe how you plan to measure and enforce quality standards at each step. Describe your chosen quality metrics and how you will ensure your desired quality standards will be maintained.

• Operationalization plan – Once you have successfully deployed your application conducted a formal hand-off to customers, describe how you will hand-off the maintenance of your application to operations.

Describe the process of handing off the application and what operations needs to take delivery of your application responsibilities.

Information Security Questions

1. What are Sarbanes-Oxley and HIPAA and what role do they play in information security? Write a 3 page paper to answer these questions.

2 . Now that you know what SOX and HIPAA are, search the internet and identify a case where SOX and HIPPA could have prevented a security breach or fraud. Then, write a one to three page summary of the event.

Exploring Vulnerable Wireless Local Area Networks Lab Report

Deliverables:

Submit a Microsoft Word document with formatting and APA citations in conformity with CSU Global Writing Center (Links to an external site.). Include the following:

  1. Write a summary narrative at least 1-page in length that describes the challenges you faced and explains what you learned from the lab activity.

Watch this video and summarize steps used in the video to crack the WPA key.

http://www.vlabsondemand.com/video/hacking_lab08/

Application of Statistical Methods to Real World Discussion

(a) Share 6 cited ACADEMIC (not sales-oriented case studies from vendors such as IBM or Deloitte) resources that discuss the application of statistical methods to real world solutions.(Minimum 300 Words)

(b) Include a simple 2 column grid that identifies the problem and the method to solve

Note:6 Cited resources APA format.

Target Stores Data Security Breach

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs(300 words), briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

ABM Based Gaming Simulation for Policy Making

Chapter 13 discussed managing complex systems and chapter 15 introduced the advantages of visual decision support. Discuss how you would combine the two concepts to create visualizations for an ABM-Based Gaming simulation for policy making. First, describe what specific policy you’re trying to create. Let’s stick with the SmartCity scenario. Describe a specific policy, and how you plan to use ABM-Based Gaming to build a model for simulate the effects of the policy. Then, describe what type of visualization technique you’ll use to make the model more accessible. Use figure 15.9 and describe what data a new column for your policy would contain.

Write a minimum of 300 words, minimum of 2 citations, APA format. No Plagiarism.

Risk of Vagueness in Sharing Technical Information and Protocol

Explore the valuation framework and fundamental analysis for cryptoassets. What is the risk of vagueness when it comes to technical information and protocol?

 

Operations Security Scenario

Discussion Topic:

Scenario :

“You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from the speakers.”

Discussion Question:

  • What is the first possible diagnosis that comes to your mind?
  • What is the first step you would take in this situation?
  • What is the second step that you would take in this situation?

– 1) Discussion topic must be around 200-250 words
– 2) Must respond to 2 peers discussion topics

Reference:

Texbook: Security Policies and Implementation Issues, Author: Robert Johnson

Managerial Issues in a Networked Organization Analysis

ANALYSISUsing 600-1000 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format.

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.