SlideShare a Scribd company logo
How Blockchain Can Improve Your
Cyber Security
The blockchain is a developing technology, one that can make the web much more secure, so
how can it be practically implemented into your cybersecurity?
What Is A Blockchain?
Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the
blockchain, and every user of the network is responsible for verifying that the data being added
is real. To form a blockchain, users utilise powerful computers to perform complex mathematical
problems, once the problem is solved it forms a block, which then gets added onto the chain of
already performed calculations, which gradually become more difficult. This data remains on the
network forever, it cannot be altered or removed.
Public And Private Blockchains
Public blockchains allow any and every user to join the blockchain, there is no organisation or
individual that controls the blockchain. Public blockchains use the internet to allow connections
to take place, from which everyone can view, create and verify data, a primary example of this is
Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient
to cyberattacks as attackers require control over half of the network in order for them to be able
to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the
large number of users attempting to reach a consensus, this also leads to a large amount of
energy consumption.
Private blockchains have a single entity that restricts what users are permitted to access the
network and what users can do on the network, such as whether they can view, create and/or
verify data, this allows businesses and organisations to utilise blockchain technology in a private
environment. Because there is only one entity that controls the network, attackers are unable to
manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
On the other hand, private blockchains are much faster and more efficient than public
blockchains and use far less energy.
Decentralised Storage
With decentralised storage there comes some risk. For example, decentralised storage will
increase the number of attack vectors for attackers. However, a decentralised storage system is
highly resilient, so even if the system is exposed, it will be very difficult for the attacker to
change or remove any data stored on the blockchain. This is because each node (a user that
offers storage space) independently verifies every piece of data throughout the system. This
means that as long as one unaffected node remains within a network (that may number in
millions) all data can be restored.
Prevent DDoS Using Decentralized Nodes
Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so
much data that it cannot process the data fast enough, causing a slowdown or crash for the
system. By using a decentralised blockchain system, the network has much more resources
available to it, meaning that attackers require a lot more resources to have any effect. When one
node is attacked and overwhelmed, another totally separate node will take its place to process
the data. This will continue until all nodes on the network are overwhelmed, but on a
decentralised network, the number of nodes can number in the millions.
Attacking Blockchains
Phishing attacks are scamming attempts where the attacker pretends to be someone of
authority, such as an employee's boss or a computer technician, or maybe by using a fake
replica website in order to steal data such as account details.
Routing attacks are where data that is in transit to and from the user is intercepted, and can be
analysed or modified by the attackers to their advantage, routing attacks are also difficult to
detect as there are little to no signs to the victim that there is an attacker.
Sybil attacks use many false network identities to flood a network and crash the system, similar
to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple
identity disorder).
51% attacks happen when attackers manage to pool enough resources together that they are
able to provide more than 50% of the network’s mining power. Having more than 50% of the
power gives the attacker control over the ledger and they are able to manipulate it.
Because of the blockchain’s tendency to be more secure than your average network, attackers
will instead attack the external connections to the blockchains, such as cryptocurrency
exchanges and cryptocurrency wallets, so far, many millions have already been stolen.
Attackers manage this through 3 primary methods, one method is by stealing private keys, keys
are personal digital signatures that are used to access cryptocurrency wallets. A second method
is to hack an employee account for one of the exchanges, which may give the attackers access
to user data and thereafter, user accounts and wallets. The third attack method is through code
exploitation, where attackers find a security hole in the code of an exchange and utilise this to
their benefit.
Due to these external attacks, users will lose lots of personal funds, which leads to users
quitting the blockchain network as they no longer have much of a financial incentive if all of their
funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may
cover the lost user funds, but this is an expensive solution, and if the security is not improved
then these attacks become frequent, and the company may run out of funds to repay user
losses.

More Related Content

Similar to How Blockchain Can Improve Your Cyber Security

blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
gugan7097
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdf
Mavie Crypto
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pixel Crayons
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
Ishaan Bhardwaj
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...
Richa575316
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Unbiased Technolab
 
Blockchain
BlockchainBlockchain
Blockchain
Mehul jadav
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
Block yber.pptx
Block yber.pptxBlock yber.pptx
Block yber.pptx
selvidevaraj203026
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
RagaviRaghavan
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
Celine George
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
ChelladuraiBose1
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
Abhishek Jaiswal
 
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdfBlockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Harry977415
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
ShikhaKonda
 

Similar to How Blockchain Can Improve Your Cyber Security (20)

blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdf
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
Blockchain
BlockchainBlockchain
Blockchain
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Block yber.pptx
Block yber.pptxBlock yber.pptx
Block yber.pptx
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdfBlockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
Blockchain Facts_What Is It, How IT Works and How Can It Be Used.pdf
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
 

More from Daniel Martin

Activities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetActivities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, Dorset
Daniel Martin
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
Daniel Martin
 
What Makes A Good Local Councillor
What Makes A Good Local CouncillorWhat Makes A Good Local Councillor
What Makes A Good Local Councillor
Daniel Martin
 
What Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorWhat Is The Role Of A Local Councillor
What Is The Role Of A Local Councillor
Daniel Martin
 
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Daniel Martin
 
The History Of Poole
The History Of PooleThe History Of Poole
The History Of Poole
Daniel Martin
 
Things to do in Poole
Things to do in PooleThings to do in Poole
Things to do in Poole
Daniel Martin
 
Poole Councillors .pdf
Poole Councillors .pdfPoole Councillors .pdf
Poole Councillors .pdf
Daniel Martin
 

More from Daniel Martin (8)

Activities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetActivities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, Dorset
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
What Makes A Good Local Councillor
What Makes A Good Local CouncillorWhat Makes A Good Local Councillor
What Makes A Good Local Councillor
 
What Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorWhat Is The Role Of A Local Councillor
What Is The Role Of A Local Councillor
 
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility
 
The History Of Poole
The History Of PooleThe History Of Poole
The History Of Poole
 
Things to do in Poole
Things to do in PooleThings to do in Poole
Things to do in Poole
 
Poole Councillors .pdf
Poole Councillors .pdfPoole Councillors .pdf
Poole Councillors .pdf
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

How Blockchain Can Improve Your Cyber Security

  • 1. How Blockchain Can Improve Your Cyber Security The blockchain is a developing technology, one that can make the web much more secure, so how can it be practically implemented into your cybersecurity? What Is A Blockchain? Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the blockchain, and every user of the network is responsible for verifying that the data being added is real. To form a blockchain, users utilise powerful computers to perform complex mathematical problems, once the problem is solved it forms a block, which then gets added onto the chain of already performed calculations, which gradually become more difficult. This data remains on the network forever, it cannot be altered or removed. Public And Private Blockchains Public blockchains allow any and every user to join the blockchain, there is no organisation or individual that controls the blockchain. Public blockchains use the internet to allow connections to take place, from which everyone can view, create and verify data, a primary example of this is Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient to cyberattacks as attackers require control over half of the network in order for them to be able to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the large number of users attempting to reach a consensus, this also leads to a large amount of energy consumption. Private blockchains have a single entity that restricts what users are permitted to access the network and what users can do on the network, such as whether they can view, create and/or verify data, this allows businesses and organisations to utilise blockchain technology in a private environment. Because there is only one entity that controls the network, attackers are unable to manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
  • 2. On the other hand, private blockchains are much faster and more efficient than public blockchains and use far less energy. Decentralised Storage With decentralised storage there comes some risk. For example, decentralised storage will increase the number of attack vectors for attackers. However, a decentralised storage system is highly resilient, so even if the system is exposed, it will be very difficult for the attacker to change or remove any data stored on the blockchain. This is because each node (a user that offers storage space) independently verifies every piece of data throughout the system. This means that as long as one unaffected node remains within a network (that may number in millions) all data can be restored. Prevent DDoS Using Decentralized Nodes Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so much data that it cannot process the data fast enough, causing a slowdown or crash for the system. By using a decentralised blockchain system, the network has much more resources available to it, meaning that attackers require a lot more resources to have any effect. When one node is attacked and overwhelmed, another totally separate node will take its place to process the data. This will continue until all nodes on the network are overwhelmed, but on a decentralised network, the number of nodes can number in the millions. Attacking Blockchains Phishing attacks are scamming attempts where the attacker pretends to be someone of authority, such as an employee's boss or a computer technician, or maybe by using a fake replica website in order to steal data such as account details. Routing attacks are where data that is in transit to and from the user is intercepted, and can be analysed or modified by the attackers to their advantage, routing attacks are also difficult to detect as there are little to no signs to the victim that there is an attacker. Sybil attacks use many false network identities to flood a network and crash the system, similar to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple identity disorder). 51% attacks happen when attackers manage to pool enough resources together that they are able to provide more than 50% of the network’s mining power. Having more than 50% of the power gives the attacker control over the ledger and they are able to manipulate it. Because of the blockchain’s tendency to be more secure than your average network, attackers will instead attack the external connections to the blockchains, such as cryptocurrency exchanges and cryptocurrency wallets, so far, many millions have already been stolen. Attackers manage this through 3 primary methods, one method is by stealing private keys, keys are personal digital signatures that are used to access cryptocurrency wallets. A second method is to hack an employee account for one of the exchanges, which may give the attackers access to user data and thereafter, user accounts and wallets. The third attack method is through code
  • 3. exploitation, where attackers find a security hole in the code of an exchange and utilise this to their benefit. Due to these external attacks, users will lose lots of personal funds, which leads to users quitting the blockchain network as they no longer have much of a financial incentive if all of their funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may cover the lost user funds, but this is an expensive solution, and if the security is not improved then these attacks become frequent, and the company may run out of funds to repay user losses.