2. Blockchain for
Cybersecurity
Digital Identity Protection
Digital Record Protection
Decentralised Certificates
Digital Device Protection
Privacy Preserving Contracts
Zero Knowledge Proofs
5. Why Blockchain is a secure alternative
to traditional database architectures
Transactions can be suppressed in
traditional databases
Participants have to trust database
owners
Risk is concentrated on each database
owner
Data visibility in a traditional database is
local only
Expensive data security and integration
cost in traditional databases
7. Origin of
Blockchain
Technology
• Double Spending is prevented with
peer to peer network
• No mint or trusted third parties
• Participants can be anonymous
• New coins are made from
hashcash style proof of work
• The proof of work also powers the
network to prevent double
spending
8.
9. What is in a
Blockchain Node
Decided Valid Blocks
Decided Invalid Blocks
Undecided Blocks
Insufficient voted Blocks
17. Blockchain for Security : Possibilities
Cryptographically secure digital identity for
users, connected devices and central
servers
Invisible and locked down control systems
with micro segmentation and fine grained
access control
Best in class encryption for secure access
to connected devices
Immutable and tamper evident logs stored
securely on the Blockchain for instant
access and analysis
18. Secure Messaging using Blockchain
Startups like Obsidian are using blockchain to secure
private information exchanged in chats, messaging
apps and through social media. Obsidian’s
messenger uses blockchain to secure users’
metadata.
The user will not have to use email or any other
authentication method to use the messenger. The
metadata is randomly distributed throughout a ledger
and thus will not be available for gathering in one
single point, from which it could be compromised.
Elsewhere, engineers at the Defense Advanced
Research Projects Agency (DARPA) are reportedly
experimenting with blockchain to create a messaging
service that is secure and impenetrable to foreign
attacks.
19. Guardtime
The company takes away the need to use keys for
verification. Instead, they distribute every piece of data to
nodes throughout the system. If someone tries to alter the
data, the system analyses the whole mass of chains,
compares them to the metadata packet and then excludes
any that don’t match up.
This means that the only way to wipe the entire blockchain
out is to destroy every single separate node. If just one node
remains running with the correct data, the whole system can
be restored, even if all of the other nodes are compromised.
Guardtime’s system works in such a way that it’s always
able to detect when a change has been made to the data
and is constantly verifying the changes. This ensures that
there is no discrete way to tamper with blocks in the chain
and the data remains uncompromised.
26. Blockchain for IoT Security :
Possibilities
Track connected devices in the
network
Authenticate users and devices
Maintain data securely
Remove single point of failure
Build trust between IoT processes
Reduce cost by eliminating
intermediaries
27. Why Blockchain for IoT Security
Very often physical objects are used or
maintained by multiple parties
Multiple parties need to agree on
acceptable usage
Disputes between parties require some
record of what occurred in order to
resolve the disputes
Effects of the environment may also
factor into the agreement between
parties