SlideShare a Scribd company logo
1 of 14
APPLICATION OF
BLOCKCHAIN IN CYBER
SECURITY
Name- Prateek Panda
Class- MTech(CSE)
CONTENTS:
o Introduction
o Blockchain In Cyber Security
o Types of Cyber Security
o Major Cyber Attacks
o How Blockchain Will Transform Cyber Security?
o Application Of Blockchain In Cyber Security
o Advantages of Blockchain in Cyber Security
o Future of Blockchain-based Cyber Security
o Conclusion
09-10-2020
Prateek Panda/Cyber Security in Blockchain
2
INTRODUCTION
• As the world goes online and people relays on the
Internet for their routine processes and habits, it is
essential to maintain the security of online data.
Blockchain, a notable buzzword of recent days has
taken charges to secure online data.
• Once blockchain technology has been introduced,
the focus is on the fulfilment of the information
security properties it provides. Focusing on data
integrity, blockchain ledger is immutable.
09-10-2020Prateek Panda/Cyber Security in Blockchain 3
BLOCKCHAIN IN CYBER SECURITY
• Blockchain is a booming technology that
boosts every business and industry verticals.
As the count of cybercriminals increases
complex and are endlessly trying to steal
valuable data like financial data, health
records, intellectual property, and personal
identifiable information.
09-10-2020Prateek Panda/Cyber Security in Blockchain 4
TYPES OF CYBER SECURITY
• Basically the major types of cyber security involve the following :
1. Cloud security
2. Application security
3. Critical infrastructure security
4. Internet of things (IoT) security
5. Network security .
09-10-2020Prateek Panda/Cyber Security in Blockchain 5
MAJOR CYBER ATTACKS
• The most common types of cyber attacks that happen often are as follows:
1. Phishing attacks
2. Cross-site scripting (XSS) attack
3. Denial-of-service (DoS) and distributed denial-of- service (DDoS) attacks .
09-10-2020Prateek Panda/Cyber Security in Blockchain 6
HOW BLOCKCHAIN WILL TRANSFORM CYBER
SECURITY?
These are the following application by which block chain transfer Cyber Security.
They are as Follows:
09-10-2020Prateek Panda/Cyber Security in Blockchain
7
APPLICATION OF BLOCKCHAIN IN CYBER
SECURITY
1. A Decentralized Storage Medium :
As we people move faster with online, it is very necessary to make a safer
environment for all the personal information that we share on a medium
(computer or internet ). Most of the business still use a centralized medium
for its data storage, which makes it easier for hackers to reach data for stealing.
Since Blockchain-based decentralized storage medium can prevent business
data theft and hacks.
09-10-2020Prateek Panda/Cyber Security in Blockchain 8
CONTINUE….
2. Security in DNS :
Most of the DNS is centralized and hackers can break the connections between
a domain name and IP address and can also make the website unavailable.
Hackers in recent days try to pair DNS attacks with DDoS attacks to render
websites unusable for a certain period of time.
Using blockchain technology can make it difficult for hackers as your data or
information are stored immutable on a decentralized, distributed ledger and
immutable smart contracts are present to power connections.
09-10-2020Prateek Panda/Cyber Security in Blockchain 9
CONTINUE….
3. Securing Edge Devices via Identity Authentication:
Edge devices present especially vulnerable access points into core networks.
One example is an employee who logs into their company’s servers via their
own unsecured phone. For a hacker, penetrating an entire network through a
blatant vulnerability via an edge device is like taking candy from a baby.
Ensuring that these devices, as well as the core network itself, are insulated
with multi-step authentication processes and blockchain-level, decentralized
threat mitigation protocols is the first step in patching some of the most
obvious network entry points that hackers could exploit.
09-10-2020Prateek Panda/Cyber Security in Blockchain 10
ADVANTAGES OF BLOCKCHAIN IN CYBER
SECURITY
• Let me list a lot more benefits of using blockchain technology to prevent cyber
attacks/crime.
1. Distribution of Public Key and Multi-Signature Logins.
2. Provides Decentralizing Data Storage that Removes Honey Pot.
3. Mitigating Denial-of-Service (DDoS) Attacks.
4. Easy Verification of the Validity of Software Downloads / Updates.
5. Provenance for Computer Hardware for Prevention of Foreign Intrusion.
09-10-2020Prateek Panda/Cyber Security in Blockchain 11
FUTURE OF BLOCKCHAIN-BASED CYBER
SECURITY
• Blockchain technology can be utilized to prevent any type of data breaches, identity
thefts, cyber-attacks or false transactions ensuring data privacy and security.
• As days pass, the rate of Cybercriminals is raising which In turns create jobs for
security professionals over the next few years. It is the blockchain technology that
tends to be the saviour of data security.
• Cyber Security will be boosted double the amount of cybercriminals rate, only when
blockchain technology has been used as a medium of data storage.
09-10-2020Prateek Panda/Cyber Security in Blockchain 12
CONCLUSION
• Blockchain technology is a
breakthrough in cyber security,
as it can ensure the highest level of
data confidentiality, availability,
and security. However, the
complexity of the technology may
cause difficulties with development
and real-world use.
09-10-2020Prateek Panda/Cyber Security in Blockchain 13
09-10-2020Prateek Panda/Cyber Security in Blockchain

More Related Content

What's hot

Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and PrivacyAnil John
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxSahilBansal648873
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoTMat Keep
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Blockchain In Government - How The Technology Can Transform Government Services
Blockchain In Government - How The Technology Can Transform Government ServicesBlockchain In Government - How The Technology Can Transform Government Services
Blockchain In Government - How The Technology Can Transform Government ServicesSunil Jagani
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology FundamentalsExperfy
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

What's hot (20)

Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Blockchain
BlockchainBlockchain
Blockchain
 
BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Blockchain In Government - How The Technology Can Transform Government Services
Blockchain In Government - How The Technology Can Transform Government ServicesBlockchain In Government - How The Technology Can Transform Government Services
Blockchain In Government - How The Technology Can Transform Government Services
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Similar to Blockchain Cyber Security

A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
Role of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure securityRole of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyRinshi Singh
 
The Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyThe Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyBlockchain Council
 
Blockchain development security sharpening the cloud security
Blockchain development security  sharpening the cloud securityBlockchain development security  sharpening the cloud security
Blockchain development security sharpening the cloud securityMoon Technolabs Pvt. Ltd.
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfRosalie Lauren
 
Aztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztecLabs
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology Blockchain Council
 
Blockchain-based IoT security.pdf
Blockchain-based IoT security.pdfBlockchain-based IoT security.pdf
Blockchain-based IoT security.pdfBahaa Al Zubaidi
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 

Similar to Blockchain Cyber Security (20)

A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Role of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure securityRole of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure security
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
The Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyThe Idea Behind Blockchain Technology
The Idea Behind Blockchain Technology
 
Blockchain development security sharpening the cloud security
Blockchain development security  sharpening the cloud securityBlockchain development security  sharpening the cloud security
Blockchain development security sharpening the cloud security
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdf
 
Aztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdf
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology
 
Blockchain-based IoT security.pdf
Blockchain-based IoT security.pdfBlockchain-based IoT security.pdf
Blockchain-based IoT security.pdf
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Blockchain Cyber Security

  • 1. APPLICATION OF BLOCKCHAIN IN CYBER SECURITY Name- Prateek Panda Class- MTech(CSE)
  • 2. CONTENTS: o Introduction o Blockchain In Cyber Security o Types of Cyber Security o Major Cyber Attacks o How Blockchain Will Transform Cyber Security? o Application Of Blockchain In Cyber Security o Advantages of Blockchain in Cyber Security o Future of Blockchain-based Cyber Security o Conclusion 09-10-2020 Prateek Panda/Cyber Security in Blockchain 2
  • 3. INTRODUCTION • As the world goes online and people relays on the Internet for their routine processes and habits, it is essential to maintain the security of online data. Blockchain, a notable buzzword of recent days has taken charges to secure online data. • Once blockchain technology has been introduced, the focus is on the fulfilment of the information security properties it provides. Focusing on data integrity, blockchain ledger is immutable. 09-10-2020Prateek Panda/Cyber Security in Blockchain 3
  • 4. BLOCKCHAIN IN CYBER SECURITY • Blockchain is a booming technology that boosts every business and industry verticals. As the count of cybercriminals increases complex and are endlessly trying to steal valuable data like financial data, health records, intellectual property, and personal identifiable information. 09-10-2020Prateek Panda/Cyber Security in Blockchain 4
  • 5. TYPES OF CYBER SECURITY • Basically the major types of cyber security involve the following : 1. Cloud security 2. Application security 3. Critical infrastructure security 4. Internet of things (IoT) security 5. Network security . 09-10-2020Prateek Panda/Cyber Security in Blockchain 5
  • 6. MAJOR CYBER ATTACKS • The most common types of cyber attacks that happen often are as follows: 1. Phishing attacks 2. Cross-site scripting (XSS) attack 3. Denial-of-service (DoS) and distributed denial-of- service (DDoS) attacks . 09-10-2020Prateek Panda/Cyber Security in Blockchain 6
  • 7. HOW BLOCKCHAIN WILL TRANSFORM CYBER SECURITY? These are the following application by which block chain transfer Cyber Security. They are as Follows: 09-10-2020Prateek Panda/Cyber Security in Blockchain 7
  • 8. APPLICATION OF BLOCKCHAIN IN CYBER SECURITY 1. A Decentralized Storage Medium : As we people move faster with online, it is very necessary to make a safer environment for all the personal information that we share on a medium (computer or internet ). Most of the business still use a centralized medium for its data storage, which makes it easier for hackers to reach data for stealing. Since Blockchain-based decentralized storage medium can prevent business data theft and hacks. 09-10-2020Prateek Panda/Cyber Security in Blockchain 8
  • 9. CONTINUE…. 2. Security in DNS : Most of the DNS is centralized and hackers can break the connections between a domain name and IP address and can also make the website unavailable. Hackers in recent days try to pair DNS attacks with DDoS attacks to render websites unusable for a certain period of time. Using blockchain technology can make it difficult for hackers as your data or information are stored immutable on a decentralized, distributed ledger and immutable smart contracts are present to power connections. 09-10-2020Prateek Panda/Cyber Security in Blockchain 9
  • 10. CONTINUE…. 3. Securing Edge Devices via Identity Authentication: Edge devices present especially vulnerable access points into core networks. One example is an employee who logs into their company’s servers via their own unsecured phone. For a hacker, penetrating an entire network through a blatant vulnerability via an edge device is like taking candy from a baby. Ensuring that these devices, as well as the core network itself, are insulated with multi-step authentication processes and blockchain-level, decentralized threat mitigation protocols is the first step in patching some of the most obvious network entry points that hackers could exploit. 09-10-2020Prateek Panda/Cyber Security in Blockchain 10
  • 11. ADVANTAGES OF BLOCKCHAIN IN CYBER SECURITY • Let me list a lot more benefits of using blockchain technology to prevent cyber attacks/crime. 1. Distribution of Public Key and Multi-Signature Logins. 2. Provides Decentralizing Data Storage that Removes Honey Pot. 3. Mitigating Denial-of-Service (DDoS) Attacks. 4. Easy Verification of the Validity of Software Downloads / Updates. 5. Provenance for Computer Hardware for Prevention of Foreign Intrusion. 09-10-2020Prateek Panda/Cyber Security in Blockchain 11
  • 12. FUTURE OF BLOCKCHAIN-BASED CYBER SECURITY • Blockchain technology can be utilized to prevent any type of data breaches, identity thefts, cyber-attacks or false transactions ensuring data privacy and security. • As days pass, the rate of Cybercriminals is raising which In turns create jobs for security professionals over the next few years. It is the blockchain technology that tends to be the saviour of data security. • Cyber Security will be boosted double the amount of cybercriminals rate, only when blockchain technology has been used as a medium of data storage. 09-10-2020Prateek Panda/Cyber Security in Blockchain 12
  • 13. CONCLUSION • Blockchain technology is a breakthrough in cyber security, as it can ensure the highest level of data confidentiality, availability, and security. However, the complexity of the technology may cause difficulties with development and real-world use. 09-10-2020Prateek Panda/Cyber Security in Blockchain 13