The capstone project requires you to identify different risk management techniques for the seven domains of IT infrastructure and apply them to the adoption of an Ethereum-based Blockchain implementation called XSU Coin. XSU Coin uses Smart Contracts to create “tokens” that represent campus organizations/clubs, events, internships, employment, awards, activities, and scholarships.
You are tasked with identifying the IT infrastructure to support a public and globally accessible XSU Coin Blockchain. As an IS professional, you need to identify threat/vulnerability pairs and estimate the likelihood of their occurrence. You must decide which risk management (control) techniques are appropriate to manage these risks. You will need to specifically highlight the risks associated with a Blockchain accessible to the public – students, faculty, staff, employers, and key stakeholders. You will be required to create a presentation to senior management so they can allocate resources to prepare for and respond to the identified threats and vulnerabilities appropriately.
Scenario
XSU is an MIS powerhouse in Blockchain and they are looking to leverage the capabilities for Dr. Breaux’s Race to Excellence – Student Success, Academic Excellence, and Long-term Viability. Check, Check, and Check for Blockchain… but how? The solution, XSU Coin!
XSU Coin is an incentive Ethereum-based Blockchain solution that encourages students to collect XSU Coins and XSU Coin-based tokens to demonstrate the breadth, depth, passion, and experience for a student in their domain. Students will be assigned a “wallet” for their XSU coins and will seek out ways to college coins. Employers will use the XSU Blockchain explorer to identify potential candidates based on the content of their wallets.
Anyone can access the XSU Coin Blockchain. Only users with XSU Coins can create BSU Coin-based tokens. Anyone can host a XSU Coin node.
Tasks
You will need to create the architecture for the XSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission. Once you have identified the IT infrastructure (consider the seven domains of a typical IT infrastructure), you will identify 20 potential threats/vulnerabilities as a way to thwart concerns about implementing the system campus-wide. Consider the likelihood of each threat/risk. Assume the role of advocate as part of the IT advisory board to conduct a thorough risk management assessment.
Develop a Network Diagram (https://www.smartdraw.com/network-diagram/) of xSU Coin highlighting the seven IT domains (20 pts)
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more