Cybersecurity Program Development

Cybersecurity Program Development

Project 3: Virtual Currency
Step 2: Conduct Competitive Research of Virtual Currency

Even though Bitcoin is the best-known brand in the category, your interest in any virtual currency is being driven by the encryption method and if it is applicable to the institution\’s cybersecurity policy requirements.

Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique.

Proceed to the next step, in which you will take a look at virtualization and cloud computing, specifically the policy constraints of those elements.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30


WHATSAPP CHAT: +1 (781) 253-4162


Click ORDER NOW..

order custom paper