SlideShare a Scribd company logo
Sujata 5/31/2017
Security Challenges of Blockchain
taslet.com/security-challenges-blockchain/
The cyber attacks on banking and finance industry are increasing. We have witnessed the hacking of SWIFT
network and payment gateways for stealing consumer data. Despite every effort of cyber security defense teams,
the hackers can materialize the attacks.
Just after two months of the economy crash in 2008, cryptocurrencies like Bitcoin, Ripple, Quark etc. became
popular, and the backbone of these currencies is Blockchain. In this article let us discuss what Blockchain is? How
does it work? What are its strengths? And how safe it is?
Blockchain – What is it?
As stated above Blockchain is the technology behind the cryptocurrencies. It is distributed, censuses driven, and
peer-to-peer ledger of digital asset ownership. Asset owners can initiate the transaction for generating, validating
and recording the ownership of digital assets.
Each Blockchain transaction is confirmed in approximately 10 minutes, and the transaction data is called “Block”.
The Block is linked sequentially to the reference of the previous block. The interconnected computer or nodes
process this transaction is Chain. Each interconnected node has a current copy of Blockchain.
Following diagram depicts the Blockchain network data and how transactions are linked and encrypted using
hashing.
https://en.wikipedia.org/wiki/Blockchain#/media/File:Bitcoin_Block_Data.svg
Blockchain implementation comes in two versions, public and private, general purpose and crafted to a specific
solution, Open source and custom-made.
Usage and Benefits
The Blockchain is prominently used in the financial industry. Blockchain performs a role of trusted intermediator, as
a payment processor, tread finance partner, broker, dealer or custodian of digital assets transactions.
1/3
Apart from the financial industry Blockchain can be used for storing digital content/documents, authentication &
authorization, digital identity, real estates, and digital contacts.
There are various benefits of Blockchain, first and most important is, Blockchain eliminates the need of third party
witness or validation when two parties are exchanging digital assets. Users can trust the integrity of transactions
because they cannot be deleted or changed.
Tamper proof transactions, transparency and reducing clutter are few more advantages of Blockchain public ledger.
Security Strengths and Weaknesses
Every transaction in Blockchain is encrypted and timestamped. Once the transaction is initiated, the first node in the
chain verifies the transaction using Blockchain computational software which can understand the complex
encryption. After the verification, each transaction is added to the Blockchain as a Block with reference to the
previous Blockchain as depicted in above diagram. These transactions are mutable. This whole process maintains
the integrity of the data.
Blockchain uses the Ericsson Data Centric Security. This solution is unique because of the way the blockchain is
securely created and processed every second. Since each root hash is time-stamped and cryptographically
interlinked with the previous time slot hash value, the digital blockchain ledger becomes immutable for backward
changes in time, and for another general tampering.
Blockchain uses SHA2-256 cryptographic algorithm, which is one of the strongest algorithms and if you want to
decrypt it, quantum computing with current technology needs 2 to 128th power computing running simultaneously.
With all above features, Blockchain seems to be secure and safe from cyber-attacks.
However, Security of Blockchain is a myth. The targeted attacks like BitFinex where 120,000 units of bitcoins, worth
of $72million were stolen. Once cryptocurrency is stolen, it is difficult to trace and prove the ownership of it.
The BitFinex was first attacked in Aug 2016 and it made the entire system frozen for few hours. This year 2017
again the BitFinex was attacked with DDOS, this time the attack hampered the user experience, the users who want
to continue transactions were made to submit them to DDOS protection service which BitFinex has subscribed.
One specific attack term in the case of cryptocurrency is “51% attack”. In this attack, if any entity in the chain able to
gain a control of 50% or more computational power than nobody else will able to use the make any transactions, it is
as if your bank account is frozen. The attack can cause:
Reverse transaction attacker has made when he is in control. This can be possibly double spend transaction
Prevent some or all transactions getting confirmed
Prevent some or all transactions mining any blocks
This demonstrates that there are some inherent security concerns. Network security is the weakest link in the chain.
The hackers are always ahead of the security defense teams. It is predicted by Interpol that, Blockchain can be
used for re-purposed to export malware.
There are no regulatory guidelines or standards defined for Blockchain. This is an another blind spot in terms of
security.
Storing cryptocurrencies is another critical challenge to be considered.
Impact on Cyber Security Architecture
2/3
Since the perimeter is getting dissolved in Blockchain and all data is visible to all the Blockchain users. This is when
the network security at the edge to an endpoint or the node level becomes more important. This can be done either
at ISP level or the level of organizations security architecture.
The integrity of the transaction is taken care by the Blockchain and hence confidentiality and availability are the main
areas where cybersecurity team needs to concentrate.
The government needs to define guidelines, standards and, regulatory compliance requirements for implementation
as well as operations.
Way forward
The current implementation of Blockchain which is majorly private within organizations and that keeps hackers at
bay to experiment, And hence the attack vectors and attack type are yet to be visible.
Blockchain technology is still in infancy stage, coming years will decide the security and regulatory requirements.
3/3

More Related Content

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

security challenges of blockchain

  • 1. Sujata 5/31/2017 Security Challenges of Blockchain taslet.com/security-challenges-blockchain/ The cyber attacks on banking and finance industry are increasing. We have witnessed the hacking of SWIFT network and payment gateways for stealing consumer data. Despite every effort of cyber security defense teams, the hackers can materialize the attacks. Just after two months of the economy crash in 2008, cryptocurrencies like Bitcoin, Ripple, Quark etc. became popular, and the backbone of these currencies is Blockchain. In this article let us discuss what Blockchain is? How does it work? What are its strengths? And how safe it is? Blockchain – What is it? As stated above Blockchain is the technology behind the cryptocurrencies. It is distributed, censuses driven, and peer-to-peer ledger of digital asset ownership. Asset owners can initiate the transaction for generating, validating and recording the ownership of digital assets. Each Blockchain transaction is confirmed in approximately 10 minutes, and the transaction data is called “Block”. The Block is linked sequentially to the reference of the previous block. The interconnected computer or nodes process this transaction is Chain. Each interconnected node has a current copy of Blockchain. Following diagram depicts the Blockchain network data and how transactions are linked and encrypted using hashing. https://en.wikipedia.org/wiki/Blockchain#/media/File:Bitcoin_Block_Data.svg Blockchain implementation comes in two versions, public and private, general purpose and crafted to a specific solution, Open source and custom-made. Usage and Benefits The Blockchain is prominently used in the financial industry. Blockchain performs a role of trusted intermediator, as a payment processor, tread finance partner, broker, dealer or custodian of digital assets transactions. 1/3
  • 2. Apart from the financial industry Blockchain can be used for storing digital content/documents, authentication & authorization, digital identity, real estates, and digital contacts. There are various benefits of Blockchain, first and most important is, Blockchain eliminates the need of third party witness or validation when two parties are exchanging digital assets. Users can trust the integrity of transactions because they cannot be deleted or changed. Tamper proof transactions, transparency and reducing clutter are few more advantages of Blockchain public ledger. Security Strengths and Weaknesses Every transaction in Blockchain is encrypted and timestamped. Once the transaction is initiated, the first node in the chain verifies the transaction using Blockchain computational software which can understand the complex encryption. After the verification, each transaction is added to the Blockchain as a Block with reference to the previous Blockchain as depicted in above diagram. These transactions are mutable. This whole process maintains the integrity of the data. Blockchain uses the Ericsson Data Centric Security. This solution is unique because of the way the blockchain is securely created and processed every second. Since each root hash is time-stamped and cryptographically interlinked with the previous time slot hash value, the digital blockchain ledger becomes immutable for backward changes in time, and for another general tampering. Blockchain uses SHA2-256 cryptographic algorithm, which is one of the strongest algorithms and if you want to decrypt it, quantum computing with current technology needs 2 to 128th power computing running simultaneously. With all above features, Blockchain seems to be secure and safe from cyber-attacks. However, Security of Blockchain is a myth. The targeted attacks like BitFinex where 120,000 units of bitcoins, worth of $72million were stolen. Once cryptocurrency is stolen, it is difficult to trace and prove the ownership of it. The BitFinex was first attacked in Aug 2016 and it made the entire system frozen for few hours. This year 2017 again the BitFinex was attacked with DDOS, this time the attack hampered the user experience, the users who want to continue transactions were made to submit them to DDOS protection service which BitFinex has subscribed. One specific attack term in the case of cryptocurrency is “51% attack”. In this attack, if any entity in the chain able to gain a control of 50% or more computational power than nobody else will able to use the make any transactions, it is as if your bank account is frozen. The attack can cause: Reverse transaction attacker has made when he is in control. This can be possibly double spend transaction Prevent some or all transactions getting confirmed Prevent some or all transactions mining any blocks This demonstrates that there are some inherent security concerns. Network security is the weakest link in the chain. The hackers are always ahead of the security defense teams. It is predicted by Interpol that, Blockchain can be used for re-purposed to export malware. There are no regulatory guidelines or standards defined for Blockchain. This is an another blind spot in terms of security. Storing cryptocurrencies is another critical challenge to be considered. Impact on Cyber Security Architecture 2/3
  • 3. Since the perimeter is getting dissolved in Blockchain and all data is visible to all the Blockchain users. This is when the network security at the edge to an endpoint or the node level becomes more important. This can be done either at ISP level or the level of organizations security architecture. The integrity of the transaction is taken care by the Blockchain and hence confidentiality and availability are the main areas where cybersecurity team needs to concentrate. The government needs to define guidelines, standards and, regulatory compliance requirements for implementation as well as operations. Way forward The current implementation of Blockchain which is majorly private within organizations and that keeps hackers at bay to experiment, And hence the attack vectors and attack type are yet to be visible. Blockchain technology is still in infancy stage, coming years will decide the security and regulatory requirements. 3/3