SlideShare a Scribd company logo
Security in exchanges
SEVERAL STRATEGIES TO INCREASE EXCHANGES SECURITY
Security, a problem?
 Just this year (2017):
 In Q1 and Q2 of 2017, Bithumb the largest Korean exchange in volume was
hacked. Personal information was stolen and several customers lost money.
 In April, Youbit had to terminate its operations after losing 17% of its funds in a
hack.
 Recently (December 2017) EtherDelta was subject to a phishing attack on its
DNS server. Their DNS was compromised and the exchange traffic was re-
directed to a copycat version of the site. Result: 305 ETH lost including a full
bag of ERC20 tokens.
And so on and so forth….
Regularly, we get these news
What could be done?
Security Design Patterns
DNS phishing Attack? what to do
If the copycat site is identical to the original one, it is very hard for
users to distinguish the fake one from the original.
Add to the login screen an image and a sentence the client and
the exchange agreed. This has to be different for each user. Users
now have a way to differentiate a copycat from an original. It will
be hard to replicate pieces of information dedicated solely to each
user.
Problem:
Security Design Pattern:
A picture displayed for a
particular user
This reminds me of my vacations
A sentence the user wrote
associated to the picture
user ID
password
If a user do not see the picture and
the sentence he/she associated to
the picture, the user can infer it is a
wrong site.
A two factors authentication is
better. Especially with a cell phone
PIN to be entered in addition to the
userID/password.
Add a note mentioning that if the
picture and the comments are not
present, then it is a wrong site.
Users are then trained to watch for
these information elements. It is a
mean for exchanges to the
authenticated to users
Is it really you?
user IDs and password could be stolen and be used to
impersonate real users , then to be used to perform all kinds of
unwanted actions.
A two factor authentication involving several devices. For example,
a mobile phone in addition to a laptop/desktop. After a user
enters a user ID and a password, a code is sent to a mobile phone
and this code needs to be entered for full validation.
Problem:
Security Design Pattern:
The good old castle…
Web sites offer an open interface to the external world. Some
unknown vulnerabilities may still be present even if we tried hard
to protect the system from hackers. Modern day bank robbers do
not have machine guns, they have keyboards.
Castles of the past where built with several lines of defense, each
protected by walls. Create a similar structure with separated
networks each protected by a firewall. The open ports should be
different at each junction, and data direction being different
between each network. Even use different communication
mechanism. If possible use air gap.
Problem:
Security Design Pattern:
Web interface
And/or
FIX interface
As an example, a cryptoAsset exchange
Orders
objects
Clients
Objects
Matching
engine
Accounts
Blockchain
Settlement
Air gap:
A file used to
transfer data
What else?
 We just scratched the surface and more elaborate schemes can be put in place. For
example, in the case of exchanges, an external replicate of the accounts on different
databases shared by the settlement section and the operational section. It is harder to
compromise several databases localized in different networks
 And a lot more….
Increasing lines of defense at the critical sections increases security.
Just a few food for thoughts…

More Related Content

What's hot

Secure Code Warrior - Privacy
Secure Code Warrior - PrivacySecure Code Warrior - Privacy
Secure Code Warrior - Privacy
Secure Code Warrior
 
Ethereum Smart contract
Ethereum Smart contractEthereum Smart contract
Ethereum Smart contract
George Theofilis
 
s117
s117s117
s117
s1170034
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Internet & WWW
Internet & WWWInternet & WWW
Internet & WWW
Rita Gokani
 
eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain Technology
Vestforsk.no
 
PDF Sec
PDF SecPDF Sec
PDF Sec
deathwing
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
Ethereum: Next steps...
Ethereum: Next steps...Ethereum: Next steps...
Ethereum: Next steps...
gavofyork
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
TENZING LHADON
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
OliviaJune1
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
PoojithaChowdary7
 
Dw communication
Dw communicationDw communication
Dw communication
Arjun Chetry
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1200019
 

What's hot (14)

Secure Code Warrior - Privacy
Secure Code Warrior - PrivacySecure Code Warrior - Privacy
Secure Code Warrior - Privacy
 
Ethereum Smart contract
Ethereum Smart contractEthereum Smart contract
Ethereum Smart contract
 
s117
s117s117
s117
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Internet & WWW
Internet & WWWInternet & WWW
Internet & WWW
 
eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain Technology
 
PDF Sec
PDF SecPDF Sec
PDF Sec
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Ethereum: Next steps...
Ethereum: Next steps...Ethereum: Next steps...
Ethereum: Next steps...
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Dw communication
Dw communicationDw communication
Dw communication
 
How encryption works
How encryption worksHow encryption works
How encryption works
 

Similar to Security in exchanges

E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
Best Online Paper Writing Service
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSys
WithTheBest
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
HackIT Ukraine
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Write My Thesis Paper Thornton
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
Oodles Technologies Pvt. Ltd.
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
IJCSIS Research Publications
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
 
BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
Michelle Davies (Hryvnak)
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
Naga Dinesh
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essential Ethereum
Essential EthereumEssential Ethereum
Essential Ethereum
KC Tam
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
ecommerce
 

Similar to Security in exchanges (19)

E banking security
E banking securityE banking security
E banking security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSys
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
 
Essential Ethereum
Essential EthereumEssential Ethereum
Essential Ethereum
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Security in exchanges

  • 1. Security in exchanges SEVERAL STRATEGIES TO INCREASE EXCHANGES SECURITY
  • 2. Security, a problem?  Just this year (2017):  In Q1 and Q2 of 2017, Bithumb the largest Korean exchange in volume was hacked. Personal information was stolen and several customers lost money.  In April, Youbit had to terminate its operations after losing 17% of its funds in a hack.  Recently (December 2017) EtherDelta was subject to a phishing attack on its DNS server. Their DNS was compromised and the exchange traffic was re- directed to a copycat version of the site. Result: 305 ETH lost including a full bag of ERC20 tokens. And so on and so forth…. Regularly, we get these news
  • 5. DNS phishing Attack? what to do If the copycat site is identical to the original one, it is very hard for users to distinguish the fake one from the original. Add to the login screen an image and a sentence the client and the exchange agreed. This has to be different for each user. Users now have a way to differentiate a copycat from an original. It will be hard to replicate pieces of information dedicated solely to each user. Problem: Security Design Pattern:
  • 6. A picture displayed for a particular user This reminds me of my vacations A sentence the user wrote associated to the picture user ID password If a user do not see the picture and the sentence he/she associated to the picture, the user can infer it is a wrong site. A two factors authentication is better. Especially with a cell phone PIN to be entered in addition to the userID/password. Add a note mentioning that if the picture and the comments are not present, then it is a wrong site. Users are then trained to watch for these information elements. It is a mean for exchanges to the authenticated to users
  • 7. Is it really you? user IDs and password could be stolen and be used to impersonate real users , then to be used to perform all kinds of unwanted actions. A two factor authentication involving several devices. For example, a mobile phone in addition to a laptop/desktop. After a user enters a user ID and a password, a code is sent to a mobile phone and this code needs to be entered for full validation. Problem: Security Design Pattern:
  • 8.
  • 9. The good old castle… Web sites offer an open interface to the external world. Some unknown vulnerabilities may still be present even if we tried hard to protect the system from hackers. Modern day bank robbers do not have machine guns, they have keyboards. Castles of the past where built with several lines of defense, each protected by walls. Create a similar structure with separated networks each protected by a firewall. The open ports should be different at each junction, and data direction being different between each network. Even use different communication mechanism. If possible use air gap. Problem: Security Design Pattern:
  • 10. Web interface And/or FIX interface As an example, a cryptoAsset exchange Orders objects Clients Objects Matching engine Accounts Blockchain Settlement Air gap: A file used to transfer data
  • 11. What else?  We just scratched the surface and more elaborate schemes can be put in place. For example, in the case of exchanges, an external replicate of the accounts on different databases shared by the settlement section and the operational section. It is harder to compromise several databases localized in different networks  And a lot more…. Increasing lines of defense at the critical sections increases security. Just a few food for thoughts…