SlideShare a Scribd company logo
1 of 3
Download to read offline
How Blockchain Can Improve Your
Cyber Security
The blockchain is a developing technology, one that can make the web much more secure, so
how can it be practically implemented into your cybersecurity?
What Is A Blockchain?
Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the
blockchain, and every user of the network is responsible for verifying that the data being added
is real. To form a blockchain, users utilise powerful computers to perform complex mathematical
problems, once the problem is solved it forms a block, which then gets added onto the chain of
already performed calculations, which gradually become more difficult. This data remains on the
network forever, it cannot be altered or removed.
Public And Private Blockchains
Public blockchains allow any and every user to join the blockchain, there is no organisation or
individual that controls the blockchain. Public blockchains use the internet to allow connections
to take place, from which everyone can view, create and verify data, a primary example of this is
Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient
to cyberattacks as attackers require control over half of the network in order for them to be able
to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the
large number of users attempting to reach a consensus, this also leads to a large amount of
energy consumption.
Private blockchains have a single entity that restricts what users are permitted to access the
network and what users can do on the network, such as whether they can view, create and/or
verify data, this allows businesses and organisations to utilise blockchain technology in a private
environment. Because there is only one entity that controls the network, attackers are unable to
manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
On the other hand, private blockchains are much faster and more efficient than public
blockchains and use far less energy.
Decentralised Storage
With decentralised storage there comes some risk. For example, decentralised storage will
increase the number of attack vectors for attackers. However, a decentralised storage system is
highly resilient, so even if the system is exposed, it will be very difficult for the attacker to
change or remove any data stored on the blockchain. This is because each node (a user that
offers storage space) independently verifies every piece of data throughout the system. This
means that as long as one unaffected node remains within a network (that may number in
millions) all data can be restored.
Prevent DDoS Using Decentralized Nodes
Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so
much data that it cannot process the data fast enough, causing a slowdown or crash for the
system. By using a decentralised blockchain system, the network has much more resources
available to it, meaning that attackers require a lot more resources to have any effect. When one
node is attacked and overwhelmed, another totally separate node will take its place to process
the data. This will continue until all nodes on the network are overwhelmed, but on a
decentralised network, the number of nodes can number in the millions.
Attacking Blockchains
Phishing attacks are scamming attempts where the attacker pretends to be someone of
authority, such as an employee's boss or a computer technician, or maybe by using a fake
replica website in order to steal data such as account details.
Routing attacks are where data that is in transit to and from the user is intercepted, and can be
analysed or modified by the attackers to their advantage, routing attacks are also difficult to
detect as there are little to no signs to the victim that there is an attacker.
Sybil attacks use many false network identities to flood a network and crash the system, similar
to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple
identity disorder).
51% attacks happen when attackers manage to pool enough resources together that they are
able to provide more than 50% of the network’s mining power. Having more than 50% of the
power gives the attacker control over the ledger and they are able to manipulate it.
Because of the blockchain’s tendency to be more secure than your average network, attackers
will instead attack the external connections to the blockchains, such as cryptocurrency
exchanges and cryptocurrency wallets, so far, many millions have already been stolen.
Attackers manage this through 3 primary methods, one method is by stealing private keys, keys
are personal digital signatures that are used to access cryptocurrency wallets. A second method
is to hack an employee account for one of the exchanges, which may give the attackers access
to user data and thereafter, user accounts and wallets. The third attack method is through code
exploitation, where attackers find a security hole in the code of an exchange and utilise this to
their benefit.
Due to these external attacks, users will lose lots of personal funds, which leads to users
quitting the blockchain network as they no longer have much of a financial incentive if all of their
funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may
cover the lost user funds, but this is an expensive solution, and if the security is not improved
then these attacks become frequent, and the company may run out of funds to repay user
losses.

More Related Content

Similar to How Blockchain Can Improve Your Cyber Security

blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universitygugan7097
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsSoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdfMavie Crypto
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePixel Crayons
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Richa575316
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyUnbiased Technolab
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityRagaviRaghavan
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek Jaiswal
 
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdfBlockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdfHarry977415
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudShikhaKonda
 

Similar to How Blockchain Can Improve Your Cyber Security (20)

blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdf
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
Blockchain
BlockchainBlockchain
Blockchain
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Block yber.pptx
Block yber.pptxBlock yber.pptx
Block yber.pptx
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdfBlockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
 

More from Daniel Martin

Activities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetActivities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetDaniel Martin
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
What Makes A Good Local Councillor
What Makes A Good Local CouncillorWhat Makes A Good Local Councillor
What Makes A Good Local CouncillorDaniel Martin
 
What Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorWhat Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorDaniel Martin
 
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Daniel Martin
 
The History Of Poole
The History Of PooleThe History Of Poole
The History Of PooleDaniel Martin
 
Things to do in Poole
Things to do in PooleThings to do in Poole
Things to do in PooleDaniel Martin
 
Poole Councillors .pdf
Poole Councillors .pdfPoole Councillors .pdf
Poole Councillors .pdfDaniel Martin
 

More from Daniel Martin (8)

Activities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetActivities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, Dorset
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
What Makes A Good Local Councillor
What Makes A Good Local CouncillorWhat Makes A Good Local Councillor
What Makes A Good Local Councillor
 
What Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorWhat Is The Role Of A Local Councillor
What Is The Role Of A Local Councillor
 
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility
 
The History Of Poole
The History Of PooleThe History Of Poole
The History Of Poole
 
Things to do in Poole
Things to do in PooleThings to do in Poole
Things to do in Poole
 
Poole Councillors .pdf
Poole Councillors .pdfPoole Councillors .pdf
Poole Councillors .pdf
 

Recently uploaded

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

How Blockchain Can Improve Your Cyber Security

  • 1. How Blockchain Can Improve Your Cyber Security The blockchain is a developing technology, one that can make the web much more secure, so how can it be practically implemented into your cybersecurity? What Is A Blockchain? Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the blockchain, and every user of the network is responsible for verifying that the data being added is real. To form a blockchain, users utilise powerful computers to perform complex mathematical problems, once the problem is solved it forms a block, which then gets added onto the chain of already performed calculations, which gradually become more difficult. This data remains on the network forever, it cannot be altered or removed. Public And Private Blockchains Public blockchains allow any and every user to join the blockchain, there is no organisation or individual that controls the blockchain. Public blockchains use the internet to allow connections to take place, from which everyone can view, create and verify data, a primary example of this is Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient to cyberattacks as attackers require control over half of the network in order for them to be able to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the large number of users attempting to reach a consensus, this also leads to a large amount of energy consumption. Private blockchains have a single entity that restricts what users are permitted to access the network and what users can do on the network, such as whether they can view, create and/or verify data, this allows businesses and organisations to utilise blockchain technology in a private environment. Because there is only one entity that controls the network, attackers are unable to manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
  • 2. On the other hand, private blockchains are much faster and more efficient than public blockchains and use far less energy. Decentralised Storage With decentralised storage there comes some risk. For example, decentralised storage will increase the number of attack vectors for attackers. However, a decentralised storage system is highly resilient, so even if the system is exposed, it will be very difficult for the attacker to change or remove any data stored on the blockchain. This is because each node (a user that offers storage space) independently verifies every piece of data throughout the system. This means that as long as one unaffected node remains within a network (that may number in millions) all data can be restored. Prevent DDoS Using Decentralized Nodes Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so much data that it cannot process the data fast enough, causing a slowdown or crash for the system. By using a decentralised blockchain system, the network has much more resources available to it, meaning that attackers require a lot more resources to have any effect. When one node is attacked and overwhelmed, another totally separate node will take its place to process the data. This will continue until all nodes on the network are overwhelmed, but on a decentralised network, the number of nodes can number in the millions. Attacking Blockchains Phishing attacks are scamming attempts where the attacker pretends to be someone of authority, such as an employee's boss or a computer technician, or maybe by using a fake replica website in order to steal data such as account details. Routing attacks are where data that is in transit to and from the user is intercepted, and can be analysed or modified by the attackers to their advantage, routing attacks are also difficult to detect as there are little to no signs to the victim that there is an attacker. Sybil attacks use many false network identities to flood a network and crash the system, similar to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple identity disorder). 51% attacks happen when attackers manage to pool enough resources together that they are able to provide more than 50% of the network’s mining power. Having more than 50% of the power gives the attacker control over the ledger and they are able to manipulate it. Because of the blockchain’s tendency to be more secure than your average network, attackers will instead attack the external connections to the blockchains, such as cryptocurrency exchanges and cryptocurrency wallets, so far, many millions have already been stolen. Attackers manage this through 3 primary methods, one method is by stealing private keys, keys are personal digital signatures that are used to access cryptocurrency wallets. A second method is to hack an employee account for one of the exchanges, which may give the attackers access to user data and thereafter, user accounts and wallets. The third attack method is through code
  • 3. exploitation, where attackers find a security hole in the code of an exchange and utilise this to their benefit. Due to these external attacks, users will lose lots of personal funds, which leads to users quitting the blockchain network as they no longer have much of a financial incentive if all of their funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may cover the lost user funds, but this is an expensive solution, and if the security is not improved then these attacks become frequent, and the company may run out of funds to repay user losses.