Risk on Crypto Currencies

I
Security Concerns and Risk related
to Cryptocurrencies
Dr. Kaleem Usmani
Bitcoin is the beginning of something great: a currency without a government,
something necessary and imperative.
- Nassim Taleb
A Cryptocurrency is a digital currency that is created
through mathematical engineering (algorithm).
It is designed to be open, anonymous, secure, fast and bypasses
traditional financial structures.
Bitcoin, created in 2009, was the world’s first
Cryptocurrency. Since then, many new Cryptocurrencies
(also known as Altcoins) have been introduced.
ADVANTAGES OF CRYPTOCURRENCY OVER
TRADITIONAL MONEY
VS Traditional
Digital currency maintains its users complete anonymity.
When you make a purchase with traditional money your
personal information is attached to each and every transaction
which can be used to track you and take note of your
purchases. But cryptocurrency transactions carry no personal
information.
Cryptocurrencies aren't directly linked to the laws,
rules or regulations of any government, corporation
or bank. Hence, the interest rates, fees and
surcharges that you may have to pay on your bank
account or credit card do not effect your transactions
or cryptocurrency in any manner.
Risk on Crypto Currencies
How does cryptocurrencies work ?
The Mining Process
SERVERS GENERATE COMPLEX
MATH PROBLEMS
MINERS GENERATE SOLUTION
TO RELEASE XCOINS
How to use Cryptocurrencies
SET UP WALLET BY DOWNLOADING
SOFTWARE ON COMPUTER OR PHONE
THIS SOFTWARE GIVES YOU A UNIQUE AND SECURE
IDENTIFICATION CODE FOR BEING IDENTIFIED
IN THE NETWORK.
XVhgXFFXSCS456FGGCF6ETCF76576
YOU CAN BUY XCOINS WITH OTHER
STANDARD CURRIENCIES
FROM OTHER USERS OR REGISTERED
EXCHANGES.
THE FUND IS ADDED TO WALLET
INSTANTLY.
THE XCOIN NETWORK
AUTHENTICATES THE
TRANSACTION BY ADDING IT IN
PREVIOUS
BLOCK CHAIN AND MAINTAINS
INTEGRITY.
YOU CAN ALSO SEND PAYMENTS TO OTHER
ADDRESSES BY USING THE SECURE
SOFTWARE EASILY.
Y
Y
Y
Y
Role of Blockchain in Xcoin mining
USER ‘A’ SENDS FUND TO USER ‘B’
THE TRANSACTION IS CONVERTED TO A ‘BLOCK’
THE TRANSACTION IS BROADCASTED ON THE
NETWORK FOR VALIDATION
THIS BLOCK IS ADDED TO THE EARLIER NON
REVERSIBLE PROCESS CHAIN OF BLOCKFINALLY USER ‘B’ RECIEVES FUNDS FROM USER ‘A’
Selfish Mining— This allows a sufficient size pool of
“selfish miners” to gain revenue larger than its ratio of
mining power, which forces “honest miners” to spend
their cycles on blocks that won’t make it to the
blockchain.
Double Spending— This allows an attacker to
successfully make more than one transaction using a
single coin, which invalidates the “honest” transaction.
Security Concerns with Cryptocurrencies
Wallet Software/Distributed Denials of Service Attacks
(DDoS)—“Wallets” are client-side applications used to manage
Bitcoins and transactions of Bitcoins from/to the client and can
be accessed online or via download. Online wallets are more
vulnerable to DDoS attacks since they need encryption and are
backed off-line.
Acquiring Greater Than 50% Computing Power— This is when
any conspiring user acquires more than 50% of the computing
power in mining process, which can also lead to other attacks.
Security Concerns with Cryptocurrencies
Timejacking— This happens when an attacker announces an
inaccurate timestamp while connecting to a node for a
transaction, altering the network time counter and deceiving
the node, which can cause double-spending.
Security Concerns with Cryptocurrencies
Thank You
1 of 15

Recommended

Crypto currencyCrypto currency
Crypto currencyRaju Samanta
1.8K views12 slides
CryptocurrencyCryptocurrency
CryptocurrencySaroj Bhandari
1.5K views17 slides
CryptocurrencyCryptocurrency
CryptocurrencyYuvarajManimaran1
906 views21 slides
CryptocurrencyCryptocurrency
Cryptocurrencytanmaymodi4
1.3K views17 slides

More Related Content

What's hot(20)

CryptocurrencyCryptocurrency
Cryptocurrency
Rohit Kumar Kashyap900 views
Cryptocurrency Cryptocurrency
Cryptocurrency
MohitYadav2913K views
Crypto currency Ppt PresentationCrypto currency Ppt Presentation
Crypto currency Ppt Presentation
AbinashRout211.6K views
Crypto & Crpyocurrencies IntroCrypto & Crpyocurrencies Intro
Crypto & Crpyocurrencies Intro
Tal Shmueli1.4K views
CryptocurrencyCryptocurrency
Cryptocurrency
crypt0029.1K views
Understanding BitcoinUnderstanding Bitcoin
Understanding Bitcoin
Leslie Bayona2.7K views
What is Cryptocurrency What is Cryptocurrency
What is Cryptocurrency
James Travis649 views
Crypto currency presentationCrypto currency presentation
Crypto currency presentation
obaid r767 views
Presentation on cryptocurrencyPresentation on cryptocurrency
Presentation on cryptocurrency
Dhruv Gandhi5.6K views
Understanding CryptocurrencyUnderstanding Cryptocurrency
Understanding Cryptocurrency
Kapil Gupta40.6K views
CryptocurrencyCryptocurrency
Cryptocurrency
Remaisha Ali2.2K views
Stable Coins: Currency for a Digitized WorldStable Coins: Currency for a Digitized World
Stable Coins: Currency for a Digitized World
Ionixx Technologies Inc.225 views
Cryptocurrency in real worldCryptocurrency in real world
Cryptocurrency in real world
Lalit Kumar Gangwar878 views
What Are Crypto Tokens & How Crypto Tokens Work?What Are Crypto Tokens & How Crypto Tokens Work?
What Are Crypto Tokens & How Crypto Tokens Work?
Blockchain Council13.5K views
CryptocurrencyCryptocurrency
Cryptocurrency
Sarvesh Meena1.5K views
Regulating CryptocurrencyRegulating Cryptocurrency
Regulating Cryptocurrency
orrenprunckun2.5K views
The Future of Digital CurrenciesThe Future of Digital Currencies
The Future of Digital Currencies
Robin Teigland5.4K views

Similar to Risk on Crypto Currencies(20)

Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
Maxim Kozlovsky223 views
Crypto currency1Crypto currency1
Crypto currency1
Ankit Rastogi132 views
Document1.docxDocument1.docx
Document1.docx
KartikeyfromBlacksof4 views
What is bitcoin and How Does it WorkWhat is bitcoin and How Does it Work
What is bitcoin and How Does it Work
JackSmith43585053 views
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?
101 Blockchains5K views
Digital Currency .pdfDigital Currency .pdf
Digital Currency .pdf
deeipblog6 views
Pi networkPi network
Pi network
VamsikrishnaVemavara282 views
Cryptocurrency Exchange AppCryptocurrency Exchange App
Cryptocurrency Exchange App
The NineHertz177 views
Blockchain Liquidity RiskBlockchain Liquidity Risk
Blockchain Liquidity Risk
InvestingTips4 views
A Survey on Crypto CurrenciesA Survey on Crypto Currencies
A Survey on Crypto Currencies
idescitation906 views
crapto full page.docxcrapto full page.docx
crapto full page.docx
RajpootBhatti133 views
crapto full page.docxcrapto full page.docx
crapto full page.docx
RajpootBhatti135 views
Blockchain Technology and CryptocurrencyBlockchain Technology and Cryptocurrency
Blockchain Technology and Cryptocurrency
AdityaSingh1213210 views
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptx
AlexKalsoft4 views

More from Sylvain Martinez(20)

PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
Sylvain Martinez234 views
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY
Sylvain Martinez1.2K views
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
Sylvain Martinez597 views
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
Sylvain Martinez1.3K views
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
Sylvain Martinez2.3K views
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez416 views
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
Sylvain Martinez618 views
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
Sylvain Martinez286 views
IOT SecurityIOT Security
IOT Security
Sylvain Martinez888 views
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?
Sylvain Martinez255 views
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
Sylvain Martinez180 views
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
Sylvain Martinez206 views
The Art of CTFThe Art of CTF
The Art of CTF
Sylvain Martinez223 views
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
Sylvain Martinez457 views
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
Sylvain Martinez1.1K views
Talk1 esc7 muscl-gdpr_debate_v1_2Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2
Sylvain Martinez195 views
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez183 views
Ethical HackingEthical Hacking
Ethical Hacking
Sylvain Martinez249 views

Recently uploaded(20)

Liqid: Composable CXL PreviewLiqid: Composable CXL Preview
Liqid: Composable CXL Preview
CXL Forum118 views
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh34 views
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum183 views
Green Leaf Consulting: Capabilities DeckGreen Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting170 views

Risk on Crypto Currencies

  • 1. I Security Concerns and Risk related to Cryptocurrencies Dr. Kaleem Usmani
  • 2. Bitcoin is the beginning of something great: a currency without a government, something necessary and imperative. - Nassim Taleb
  • 3. A Cryptocurrency is a digital currency that is created through mathematical engineering (algorithm). It is designed to be open, anonymous, secure, fast and bypasses traditional financial structures.
  • 4. Bitcoin, created in 2009, was the world’s first Cryptocurrency. Since then, many new Cryptocurrencies (also known as Altcoins) have been introduced.
  • 5. ADVANTAGES OF CRYPTOCURRENCY OVER TRADITIONAL MONEY VS Traditional
  • 6. Digital currency maintains its users complete anonymity. When you make a purchase with traditional money your personal information is attached to each and every transaction which can be used to track you and take note of your purchases. But cryptocurrency transactions carry no personal information.
  • 7. Cryptocurrencies aren't directly linked to the laws, rules or regulations of any government, corporation or bank. Hence, the interest rates, fees and surcharges that you may have to pay on your bank account or credit card do not effect your transactions or cryptocurrency in any manner.
  • 9. How does cryptocurrencies work ? The Mining Process SERVERS GENERATE COMPLEX MATH PROBLEMS MINERS GENERATE SOLUTION TO RELEASE XCOINS
  • 10. How to use Cryptocurrencies SET UP WALLET BY DOWNLOADING SOFTWARE ON COMPUTER OR PHONE THIS SOFTWARE GIVES YOU A UNIQUE AND SECURE IDENTIFICATION CODE FOR BEING IDENTIFIED IN THE NETWORK. XVhgXFFXSCS456FGGCF6ETCF76576 YOU CAN BUY XCOINS WITH OTHER STANDARD CURRIENCIES FROM OTHER USERS OR REGISTERED EXCHANGES. THE FUND IS ADDED TO WALLET INSTANTLY. THE XCOIN NETWORK AUTHENTICATES THE TRANSACTION BY ADDING IT IN PREVIOUS BLOCK CHAIN AND MAINTAINS INTEGRITY. YOU CAN ALSO SEND PAYMENTS TO OTHER ADDRESSES BY USING THE SECURE SOFTWARE EASILY.
  • 11. Y Y Y Y Role of Blockchain in Xcoin mining USER ‘A’ SENDS FUND TO USER ‘B’ THE TRANSACTION IS CONVERTED TO A ‘BLOCK’ THE TRANSACTION IS BROADCASTED ON THE NETWORK FOR VALIDATION THIS BLOCK IS ADDED TO THE EARLIER NON REVERSIBLE PROCESS CHAIN OF BLOCKFINALLY USER ‘B’ RECIEVES FUNDS FROM USER ‘A’
  • 12. Selfish Mining— This allows a sufficient size pool of “selfish miners” to gain revenue larger than its ratio of mining power, which forces “honest miners” to spend their cycles on blocks that won’t make it to the blockchain. Double Spending— This allows an attacker to successfully make more than one transaction using a single coin, which invalidates the “honest” transaction. Security Concerns with Cryptocurrencies
  • 13. Wallet Software/Distributed Denials of Service Attacks (DDoS)—“Wallets” are client-side applications used to manage Bitcoins and transactions of Bitcoins from/to the client and can be accessed online or via download. Online wallets are more vulnerable to DDoS attacks since they need encryption and are backed off-line. Acquiring Greater Than 50% Computing Power— This is when any conspiring user acquires more than 50% of the computing power in mining process, which can also lead to other attacks. Security Concerns with Cryptocurrencies
  • 14. Timejacking— This happens when an attacker announces an inaccurate timestamp while connecting to a node for a transaction, altering the network time counter and deceiving the node, which can cause double-spending. Security Concerns with Cryptocurrencies