SlideShare a Scribd company logo
1 of 11
Security in exchanges
SEVERAL STRATEGIES TO INCREASE EXCHANGES SECURITY
Security, a problem?
 Just this year (2017):
 In Q1 and Q2 of 2017, Bithumb the largest Korean exchange in volume was
hacked. Personal information was stolen and several customers lost money.
 In April, Youbit had to terminate its operations after losing 17% of its funds in a
hack.
 Recently (December 2017) EtherDelta was subject to a phishing attack on its
DNS server. Their DNS was compromised and the exchange traffic was re-
directed to a copycat version of the site. Result: 305 ETH lost including a full
bag of ERC20 tokens.
And so on and so forth….
Regularly, we get these news
What could be done?
Security Design Patterns
DNS phishing Attack? what to do
If the copycat site is identical to the original one, it is very hard for
users to distinguish the fake one from the original.
Add to the login screen an image and a sentence the client and
the exchange agreed. This has to be different for each user. Users
now have a way to differentiate a copycat from an original. It will
be hard to replicate pieces of information dedicated solely to each
user.
Problem:
Security Design Pattern:
A picture displayed for a
particular user
This reminds me of my vacations
A sentence the user wrote
associated to the picture
user ID
password
If a user do not see the picture and
the sentence he/she associated to
the picture, the user can infer it is a
wrong site.
A two factors authentication is
better. Especially with a cell phone
PIN to be entered in addition to the
userID/password.
Add a note mentioning that if the
picture and the comments are not
present, then it is a wrong site.
Users are then trained to watch for
these information elements. It is a
mean for exchanges to the
authenticated to users
Is it really you?
user IDs and password could be stolen and be used to
impersonate real users , then to be used to perform all kinds of
unwanted actions.
A two factor authentication involving several devices. For example,
a mobile phone in addition to a laptop/desktop. After a user
enters a user ID and a password, a code is sent to a mobile phone
and this code needs to be entered for full validation.
Problem:
Security Design Pattern:
The good old castle…
Web sites offer an open interface to the external world. Some
unknown vulnerabilities may still be present even if we tried hard
to protect the system from hackers. Modern day bank robbers do
not have machine guns, they have keyboards.
Castles of the past where built with several lines of defense, each
protected by walls. Create a similar structure with separated
networks each protected by a firewall. The open ports should be
different at each junction, and data direction being different
between each network. Even use different communication
mechanism. If possible use air gap.
Problem:
Security Design Pattern:
Web interface
And/or
FIX interface
As an example, a cryptoAsset exchange
Orders
objects
Clients
Objects
Matching
engine
Accounts
Blockchain
Settlement
Air gap:
A file used to
transfer data
What else?
 We just scratched the surface and more elaborate schemes can be put in place. For
example, in the case of exchanges, an external replicate of the accounts on different
databases shared by the settlement section and the operational section. It is harder to
compromise several databases localized in different networks
 And a lot more….
Increasing lines of defense at the critical sections increases security.
Just a few food for thoughts…

More Related Content

What's hot

eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyVestforsk.no
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 
Ethereum: Next steps...
Ethereum: Next steps...Ethereum: Next steps...
Ethereum: Next steps...gavofyork
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationTENZING LHADON
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impactOliviaJune1
 
How encryption works
How encryption worksHow encryption works
How encryption workss1200019
 

What's hot (14)

Secure Code Warrior - Privacy
Secure Code Warrior - PrivacySecure Code Warrior - Privacy
Secure Code Warrior - Privacy
 
Ethereum Smart contract
Ethereum Smart contractEthereum Smart contract
Ethereum Smart contract
 
s117
s117s117
s117
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Internet & WWW
Internet & WWWInternet & WWW
Internet & WWW
 
eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain Technology
 
PDF Sec
PDF SecPDF Sec
PDF Sec
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Ethereum: Next steps...
Ethereum: Next steps...Ethereum: Next steps...
Ethereum: Next steps...
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Dw communication
Dw communicationDw communication
Dw communication
 
How encryption works
How encryption worksHow encryption works
How encryption works
 

Similar to Security in exchanges

INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysWithTheBest
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueIJCSIS Research Publications
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coinNaga Dinesh
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Essential Ethereum
Essential EthereumEssential Ethereum
Essential EthereumKC Tam
 

Similar to Security in exchanges (19)

E banking security
E banking securityE banking security
E banking security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSys
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
 
Essential Ethereum
Essential EthereumEssential Ethereum
Essential Ethereum
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 

Recently uploaded

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 

Recently uploaded (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 

Security in exchanges

  • 1. Security in exchanges SEVERAL STRATEGIES TO INCREASE EXCHANGES SECURITY
  • 2. Security, a problem?  Just this year (2017):  In Q1 and Q2 of 2017, Bithumb the largest Korean exchange in volume was hacked. Personal information was stolen and several customers lost money.  In April, Youbit had to terminate its operations after losing 17% of its funds in a hack.  Recently (December 2017) EtherDelta was subject to a phishing attack on its DNS server. Their DNS was compromised and the exchange traffic was re- directed to a copycat version of the site. Result: 305 ETH lost including a full bag of ERC20 tokens. And so on and so forth…. Regularly, we get these news
  • 5. DNS phishing Attack? what to do If the copycat site is identical to the original one, it is very hard for users to distinguish the fake one from the original. Add to the login screen an image and a sentence the client and the exchange agreed. This has to be different for each user. Users now have a way to differentiate a copycat from an original. It will be hard to replicate pieces of information dedicated solely to each user. Problem: Security Design Pattern:
  • 6. A picture displayed for a particular user This reminds me of my vacations A sentence the user wrote associated to the picture user ID password If a user do not see the picture and the sentence he/she associated to the picture, the user can infer it is a wrong site. A two factors authentication is better. Especially with a cell phone PIN to be entered in addition to the userID/password. Add a note mentioning that if the picture and the comments are not present, then it is a wrong site. Users are then trained to watch for these information elements. It is a mean for exchanges to the authenticated to users
  • 7. Is it really you? user IDs and password could be stolen and be used to impersonate real users , then to be used to perform all kinds of unwanted actions. A two factor authentication involving several devices. For example, a mobile phone in addition to a laptop/desktop. After a user enters a user ID and a password, a code is sent to a mobile phone and this code needs to be entered for full validation. Problem: Security Design Pattern:
  • 8.
  • 9. The good old castle… Web sites offer an open interface to the external world. Some unknown vulnerabilities may still be present even if we tried hard to protect the system from hackers. Modern day bank robbers do not have machine guns, they have keyboards. Castles of the past where built with several lines of defense, each protected by walls. Create a similar structure with separated networks each protected by a firewall. The open ports should be different at each junction, and data direction being different between each network. Even use different communication mechanism. If possible use air gap. Problem: Security Design Pattern:
  • 10. Web interface And/or FIX interface As an example, a cryptoAsset exchange Orders objects Clients Objects Matching engine Accounts Blockchain Settlement Air gap: A file used to transfer data
  • 11. What else?  We just scratched the surface and more elaborate schemes can be put in place. For example, in the case of exchanges, an external replicate of the accounts on different databases shared by the settlement section and the operational section. It is harder to compromise several databases localized in different networks  And a lot more…. Increasing lines of defense at the critical sections increases security. Just a few food for thoughts…