SlideShare a Scribd company logo
Agenda
• What is the Blockchain?
• Hashing and Proof of Work
• What Happens During a Transaction?
• Bitcoin and the Case for a Global Currency
What is the Blockchain?
The definition of Blockchain
• The Blockchain is an appendable immutable universally distributed open
ledger
• Immutable – cannot delete anything from the ledger
• Appendable – can add to the ledger
• Universally distributed – everyone has access to the same exact copy of the ledger
• Open ledger – the place where all transactions are recorded
The shop example
• Imagine everyone in a shop knows via a public ledger how much currency
everyone has
• By removing the exchange of money to there is a much lower possibility that people
will be exploited
Pubic key and Private key
• As long as your private key is kept private no one will ever determine your
public key.
Security Blockchain technology provides
• The security that you get by using Blockchain technology is from the fact
that the ledger is ongoing
• If someone tires to change the information of a block within the Blockchain the block
will break and the rest of the community will know that something went wrong
• When something goes wrong nothing happens since everyone has the same copy ledger and
ensures that all transactions are valid
The need
• As the population increases and more people will want to participate in the global economy
• Examples of Blockchain technology
• Voting (Estonia since 2004)
• Currency (Venezuela)
• Security breaches are now commonplace
• Can rely on complete transaction in a protected manner
• Don’t have to worry about being victim since the user is protected on both ends with Blockchain technology
• Takes out a huge amount of time and resources keeping track of money and information
• Blockchain is trustless since everyone has the same copy of the ledger
• Blockchain technology allows people to trust people without knowing them
The value in Blockchain technology being
decentralized
• When currency becomes decentralized societies can provide more equity to
their people
• Blockchain can provide everyone with an equal playing field
• All that is necessary is a cell phone
• India has adopted Blockchain technology largely because of these reasons
Interesting applications of Blockchain
technology
• Decentralized Internet
• If the internet becomes decentralized example
• Can export processing speed and storage across the globe
• Funding farmers in developing countries
• Smart Contract
• Remove banks
• Rely on a decentralized peer-to-peer network to allow people to vote on or provide funding.
• Democracy via a public ledger
• Their last election scared France
Hashing and Proof of Work
Questions to think about during this section
• How do I know my information is safe?
• How do I know that no one can go into the Blockchain and edit transaction
data?
• How do I know that no one get into the ledger after a transaction to either
falsify accounts and void smart contracts?
This where encryption comes in…
• SHA 256 encryption is the most popular encryption today and most often
associated with Blockchain technology
• It was developed by the NSA to ensure that codes were completely unique
• SHA 256 is valuable since the hash function produces unique outputs when
given different inputs
Secure Hash Algorithm (SHA)
• SHA-256
• 256 bit encryption
• 32 bytes
• 64 alphanumeric characters long every time
Examples of SHA-256
• When one character changes all 64 characters change:
• Example:
• Abc:
• 06D90109C8CCE34EC0C776950465421E176F08B831A938B3C6E76CB7BEE8790B
• aBc:
• 516DD854EC42B5B992888CFA87AE16E260864F5E051E045CD7D7C0B45EACBEB2
• Those exact inputs above will never yield a different hash
Hash function
• What is a function
• X=Y for example put simply 1=1
• A hash makes it much more complicated
• Example: think about your last meal
Why is this important
• Protects identity
• Your hash is your private key and public key
• Identifies you uniquely and maintains privacy
• Transactions on the Blockchain can be thought of as two unique 64 character long hashes
communicating with each other
SHA security
• Can the hash be deciphered?
• Yes
• But with all of the computing power in the world it would take around 1 billion years.
Applied to cryptocurrencies
• To protect your information while providing you a high level of security
exchanges do the following:
• They hash your information and provide you a pubic and private key
• In addition, exchanges require users to produce a secret passphrase
• This is the only way to access your account
• It can not be recovered if lost since it is the reverse of the users hash function
• Reversing the work done by the algorithm but takes a lot of work
• With all of the worlds computing power it would take approximately 1 billion years
To trust Blockchain you must believe in the
hashing
• The hash that is created for a user is unique to the user
• It changes the second it is manipulated
• When each new block is mined it references the hash of the previous block
• If a hash is changed the ledger will recognize that there is a problem with the Blockchain
• If one computer recognizes a difference in the previous block it all become
invalidated
• When this happens the longest chain in the ledger becomes the most secured and thus
relied upon chain for the given Blockchian
Proof of work concept
• Validates by looking for the longest chain
• There must be a way to prove that transactions are taking place in a truthful manner
• Must be able to make the assumption that your information is safe
• If you cannot trust the mathematics you cannot trust Blockchain technology
• Everyone within the given Blockchain environment can validate the longest
chain of mined blocks
• What happens if you change the hash output of a block?
• A fork occurs
What Happens During a Transaction?
What does a transaction on a ledger based
model look like?
• We keep track through nodes on the network that track transactions within
the Blockchain
• Once a transaction is initiated the entire Blockchain community updates the publically
available ledger to reflect new totals after the transaction
• Everyone can verify transactions
• Nonce values ensure that each transactions are distinguishable
What is a nonce value
• After the hash is created
• Blockchain technology then relies on a nonce value
• A nonce value does work to prove that you did the work to mine one specific block within a
Blockchain
• This is where the processing associated with Blockchain takes place
• Once the complex math is solved that requires large amounts of processing a nonce value is then created
• A nonce value is a number that is unique to the hash it is coupled with that indicates the
amount of zeros that are to be located at the front of the hash.
• Your nonce value + your hash = the next block on your Blockchain
The value of the nonce value within a
transaction on the Blockchain
• You can prove that a transaction happened on the Blockchain
• This cannot be done with conventional currency
Smart Contracts
• Blockchain provides an opportunity to exchange value and information at
the same time
• Parameters can be set that are required for a transaction to occur
• If a malicious actor attempts to change hash values a fork will occur
• When reviewing the proof of work before a transaction one can examine the Blockchain of
a malicious actor and find a short Blockchain
• Since a hash value was maliciously edited and the Blockchain was forked
The advantage of Blockchain transactions
• The proof of work concept when combined with nonce values and SHA
256 hashes provide an incredible amount of security
• It helps ensure that only the best and most confirmed version of a given Blockchain is
in use
• This quality ensures that everyone who is participating on the Blockchain knows what is
happening and is kept up to date
• Manipulated transactions are immediately invalidated
Bitcoin and the Case for a Global Currency
Bitcoin
• 2009 Bitcoin was first developed
• Hit its first peak in 2013
• Recently started to climb again starting in 2016
Bitcoin is a currency
• This is because Bitcoin can be exchanged for goods and services
One of the first uses of Bitcoin
• Silk Road a black-market on the dark web found value in Bitcoin
• Because Bitcoin was a currency that maintained privacy by only displaying a users
private key
• Users could send value anonymously
• These qualities for a short period of time helped the Silk Road flourish
Issues with Bitcoin today
• The time and the processing power required to mine a Bitcoin today has
increased drastically since its inception
• Because of this node operators, payment processors and miners have gained the ability
to categorize transactions and monetize them
• Because so many people want to use Bitcoin miners can now ask for high fees and average
fees for getting a transaction across the network in a timely manner has also increased
• These problems are creating inefficiencies for Bitcoin since transactions are becoming more costly
and slower
Forking
• A possible solution is to fork the Bitcoin Blockchain
• Forking is attractive since it would allow the verification method to remain intact
Blockchain Training Courses
on sight…
Exam and certification fees will be included in the training price.
www.pecb.com/events
THANK YOU
?
kenny.kimbel@gmail.com linkedin.com/in/kenneth-kimbel-1478ab52

More Related Content

What's hot

Introduction to Blockchain & development
Introduction to Blockchain & developmentIntroduction to Blockchain & development
Introduction to Blockchain & development
Abdullah Aziz
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Rashi Singh
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
PalakGulati10
 
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Simplilearn
 
Spartan Blockchain - Women in Blockchain Workshop Presentation
Spartan Blockchain - Women in Blockchain Workshop PresentationSpartan Blockchain - Women in Blockchain Workshop Presentation
Spartan Blockchain - Women in Blockchain Workshop Presentation
Andrew Marquardt
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
Sébastien Tandel
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
Sanjeev Mishra
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
MecklerMedia
 
How to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumHow to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on Ethereum
DEV Cafe
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
inder_barara
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
Coin Sciences Ltd
 
How Does Blockchain Work?
How Does Blockchain Work?How Does Blockchain Work?
How Does Blockchain Work?
Blogs Crypto
 
Understanding bitcoin transactions
Understanding bitcoin transactionsUnderstanding bitcoin transactions
Understanding bitcoin transactions
jumaane williams
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
Ninad Sarang
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
Len Bass
 
Hands on with multichain
Hands on with multichainHands on with multichain
Hands on with multichain
Roderik van der Veer
 
Blockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John MaheswaranBlockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John Maheswaran
John M.
 
Information security in private blockchains
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchains
Coin Sciences Ltd
 
Dash Crypto Currency Intro for Techies
Dash Crypto Currency Intro for TechiesDash Crypto Currency Intro for Techies
Dash Crypto Currency Intro for Techies
Joseph Holbrook, Chief Learning Officer (CLO)
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Simplilearn
 

What's hot (20)

Introduction to Blockchain & development
Introduction to Blockchain & developmentIntroduction to Blockchain & development
Introduction to Blockchain & development
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
 
Spartan Blockchain - Women in Blockchain Workshop Presentation
Spartan Blockchain - Women in Blockchain Workshop PresentationSpartan Blockchain - Women in Blockchain Workshop Presentation
Spartan Blockchain - Women in Blockchain Workshop Presentation
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
How to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumHow to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on Ethereum
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
 
How Does Blockchain Work?
How Does Blockchain Work?How Does Blockchain Work?
How Does Blockchain Work?
 
Understanding bitcoin transactions
Understanding bitcoin transactionsUnderstanding bitcoin transactions
Understanding bitcoin transactions
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
 
Hands on with multichain
Hands on with multichainHands on with multichain
Hands on with multichain
 
Blockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John MaheswaranBlockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John Maheswaran
 
Information security in private blockchains
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchains
 
Dash Crypto Currency Intro for Techies
Dash Crypto Currency Intro for TechiesDash Crypto Currency Intro for Techies
Dash Crypto Currency Intro for Techies
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
 

Similar to The Secret behind the Blockchain Technology

What to expect from Blockchain in 2019?
What to expect from Blockchain in 2019?What to expect from Blockchain in 2019?
What to expect from Blockchain in 2019?
PECB
 
Block chain
Block chainBlock chain
Block chain
gehad hamdy
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
MeetPBarasara
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and cons
Jerin Sebastian
 
How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.
Waleed Ahmed
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
adinugroho751867
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain  and CryptocurrenciesIntroduction to Blockchain  and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
Nikhil D Prince
 
P.Lokesh.pptx
P.Lokesh.pptxP.Lokesh.pptx
P.Lokesh.pptx
SaivenkatBingi1
 
Architecture and operations.pptx
Architecture and operations.pptxArchitecture and operations.pptx
Architecture and operations.pptx
harshitmittal737363
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
WeKCo Coworking
 
Blockchain
BlockchainBlockchain
Blockchain
Abhinand Valasseri
 
Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20
Truong Nguyen
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain Slides
Roger Royse
 
Blockchain
BlockchainBlockchain
Blockchain
ManiDeepak10
 
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
Blockchain,  Hyperledger, DeFi, Web 3.0 - understanding and conceptsBlockchain,  Hyperledger, DeFi, Web 3.0 - understanding and concepts
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
keithfernandez19
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
Saima Mustafa
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
MaxWheelock
 
Bit.ppt
Bit.pptBit.ppt
Bit.ppt
faisalkaifee1
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
AvinashChoure2
 

Similar to The Secret behind the Blockchain Technology (20)

What to expect from Blockchain in 2019?
What to expect from Blockchain in 2019?What to expect from Blockchain in 2019?
What to expect from Blockchain in 2019?
 
Block chain
Block chainBlock chain
Block chain
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and cons
 
How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain  and CryptocurrenciesIntroduction to Blockchain  and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
 
P.Lokesh.pptx
P.Lokesh.pptxP.Lokesh.pptx
P.Lokesh.pptx
 
Architecture and operations.pptx
Architecture and operations.pptxArchitecture and operations.pptx
Architecture and operations.pptx
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
Blockchain
BlockchainBlockchain
Blockchain
 
Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain Slides
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
Blockchain,  Hyperledger, DeFi, Web 3.0 - understanding and conceptsBlockchain,  Hyperledger, DeFi, Web 3.0 - understanding and concepts
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
 
Bit.ppt
Bit.pptBit.ppt
Bit.ppt
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

The Secret behind the Blockchain Technology

  • 1.
  • 2. Agenda • What is the Blockchain? • Hashing and Proof of Work • What Happens During a Transaction? • Bitcoin and the Case for a Global Currency
  • 3. What is the Blockchain?
  • 4. The definition of Blockchain • The Blockchain is an appendable immutable universally distributed open ledger • Immutable – cannot delete anything from the ledger • Appendable – can add to the ledger • Universally distributed – everyone has access to the same exact copy of the ledger • Open ledger – the place where all transactions are recorded
  • 5. The shop example • Imagine everyone in a shop knows via a public ledger how much currency everyone has • By removing the exchange of money to there is a much lower possibility that people will be exploited
  • 6. Pubic key and Private key • As long as your private key is kept private no one will ever determine your public key.
  • 7. Security Blockchain technology provides • The security that you get by using Blockchain technology is from the fact that the ledger is ongoing • If someone tires to change the information of a block within the Blockchain the block will break and the rest of the community will know that something went wrong • When something goes wrong nothing happens since everyone has the same copy ledger and ensures that all transactions are valid
  • 8. The need • As the population increases and more people will want to participate in the global economy • Examples of Blockchain technology • Voting (Estonia since 2004) • Currency (Venezuela) • Security breaches are now commonplace • Can rely on complete transaction in a protected manner • Don’t have to worry about being victim since the user is protected on both ends with Blockchain technology • Takes out a huge amount of time and resources keeping track of money and information • Blockchain is trustless since everyone has the same copy of the ledger • Blockchain technology allows people to trust people without knowing them
  • 9. The value in Blockchain technology being decentralized • When currency becomes decentralized societies can provide more equity to their people • Blockchain can provide everyone with an equal playing field • All that is necessary is a cell phone • India has adopted Blockchain technology largely because of these reasons
  • 10. Interesting applications of Blockchain technology • Decentralized Internet • If the internet becomes decentralized example • Can export processing speed and storage across the globe • Funding farmers in developing countries • Smart Contract • Remove banks • Rely on a decentralized peer-to-peer network to allow people to vote on or provide funding. • Democracy via a public ledger • Their last election scared France
  • 11. Hashing and Proof of Work
  • 12. Questions to think about during this section • How do I know my information is safe? • How do I know that no one can go into the Blockchain and edit transaction data? • How do I know that no one get into the ledger after a transaction to either falsify accounts and void smart contracts?
  • 13. This where encryption comes in… • SHA 256 encryption is the most popular encryption today and most often associated with Blockchain technology • It was developed by the NSA to ensure that codes were completely unique • SHA 256 is valuable since the hash function produces unique outputs when given different inputs
  • 14. Secure Hash Algorithm (SHA) • SHA-256 • 256 bit encryption • 32 bytes • 64 alphanumeric characters long every time
  • 15. Examples of SHA-256 • When one character changes all 64 characters change: • Example: • Abc: • 06D90109C8CCE34EC0C776950465421E176F08B831A938B3C6E76CB7BEE8790B • aBc: • 516DD854EC42B5B992888CFA87AE16E260864F5E051E045CD7D7C0B45EACBEB2 • Those exact inputs above will never yield a different hash
  • 16. Hash function • What is a function • X=Y for example put simply 1=1 • A hash makes it much more complicated • Example: think about your last meal
  • 17. Why is this important • Protects identity • Your hash is your private key and public key • Identifies you uniquely and maintains privacy • Transactions on the Blockchain can be thought of as two unique 64 character long hashes communicating with each other
  • 18. SHA security • Can the hash be deciphered? • Yes • But with all of the computing power in the world it would take around 1 billion years.
  • 19. Applied to cryptocurrencies • To protect your information while providing you a high level of security exchanges do the following: • They hash your information and provide you a pubic and private key • In addition, exchanges require users to produce a secret passphrase • This is the only way to access your account • It can not be recovered if lost since it is the reverse of the users hash function • Reversing the work done by the algorithm but takes a lot of work • With all of the worlds computing power it would take approximately 1 billion years
  • 20. To trust Blockchain you must believe in the hashing • The hash that is created for a user is unique to the user • It changes the second it is manipulated • When each new block is mined it references the hash of the previous block • If a hash is changed the ledger will recognize that there is a problem with the Blockchain • If one computer recognizes a difference in the previous block it all become invalidated • When this happens the longest chain in the ledger becomes the most secured and thus relied upon chain for the given Blockchian
  • 21. Proof of work concept • Validates by looking for the longest chain • There must be a way to prove that transactions are taking place in a truthful manner • Must be able to make the assumption that your information is safe • If you cannot trust the mathematics you cannot trust Blockchain technology • Everyone within the given Blockchain environment can validate the longest chain of mined blocks • What happens if you change the hash output of a block? • A fork occurs
  • 22. What Happens During a Transaction?
  • 23. What does a transaction on a ledger based model look like? • We keep track through nodes on the network that track transactions within the Blockchain • Once a transaction is initiated the entire Blockchain community updates the publically available ledger to reflect new totals after the transaction • Everyone can verify transactions • Nonce values ensure that each transactions are distinguishable
  • 24. What is a nonce value • After the hash is created • Blockchain technology then relies on a nonce value • A nonce value does work to prove that you did the work to mine one specific block within a Blockchain • This is where the processing associated with Blockchain takes place • Once the complex math is solved that requires large amounts of processing a nonce value is then created • A nonce value is a number that is unique to the hash it is coupled with that indicates the amount of zeros that are to be located at the front of the hash. • Your nonce value + your hash = the next block on your Blockchain
  • 25. The value of the nonce value within a transaction on the Blockchain • You can prove that a transaction happened on the Blockchain • This cannot be done with conventional currency
  • 26. Smart Contracts • Blockchain provides an opportunity to exchange value and information at the same time • Parameters can be set that are required for a transaction to occur • If a malicious actor attempts to change hash values a fork will occur • When reviewing the proof of work before a transaction one can examine the Blockchain of a malicious actor and find a short Blockchain • Since a hash value was maliciously edited and the Blockchain was forked
  • 27. The advantage of Blockchain transactions • The proof of work concept when combined with nonce values and SHA 256 hashes provide an incredible amount of security • It helps ensure that only the best and most confirmed version of a given Blockchain is in use • This quality ensures that everyone who is participating on the Blockchain knows what is happening and is kept up to date • Manipulated transactions are immediately invalidated
  • 28. Bitcoin and the Case for a Global Currency
  • 29. Bitcoin • 2009 Bitcoin was first developed • Hit its first peak in 2013 • Recently started to climb again starting in 2016
  • 30. Bitcoin is a currency • This is because Bitcoin can be exchanged for goods and services
  • 31. One of the first uses of Bitcoin • Silk Road a black-market on the dark web found value in Bitcoin • Because Bitcoin was a currency that maintained privacy by only displaying a users private key • Users could send value anonymously • These qualities for a short period of time helped the Silk Road flourish
  • 32. Issues with Bitcoin today • The time and the processing power required to mine a Bitcoin today has increased drastically since its inception • Because of this node operators, payment processors and miners have gained the ability to categorize transactions and monetize them • Because so many people want to use Bitcoin miners can now ask for high fees and average fees for getting a transaction across the network in a timely manner has also increased • These problems are creating inefficiencies for Bitcoin since transactions are becoming more costly and slower
  • 33. Forking • A possible solution is to fork the Bitcoin Blockchain • Forking is attractive since it would allow the verification method to remain intact
  • 34. Blockchain Training Courses on sight… Exam and certification fees will be included in the training price. www.pecb.com/events