Cybersecurity Program Development
Cybersecurity Program Development
Project 3: Virtual Currency
Step 2: Conduct Competitive Research of Virtual Currency
Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution\’s cybersecurity policy requirements.
Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.
Proceed to the next step, in which you will take a look at virtualization and cloud computing, specifically the policy constraints of those elements.