BLOCKCHAIN IN CYBERSECURITY: USAGE AND CHALLENGES
Abdullah Hamdan 02/04/2020
CHALLENGES 02/04/2020 OUTLINE : Introduction Blockchain in Cyber - - PowerPoint PPT Presentation
BLOCKCHAIN IN CYBERSECURITY: USAGE AND Abdullah Hamdan CHALLENGES 02/04/2020 OUTLINE : Introduction Blockchain in Cyber security Blockchain and CIA Blockchain Security applications Blockchain Security challenges Conclusion 2 INTRODUCTION
Abdullah Hamdan 02/04/2020
Introduction Blockchain in Cyber security Blockchain and CIA Blockchain Security applications Blockchain Security challenges Conclusion
2
Definition: A blockchain is a decentralized, distributed, and oftentimes public, digital ledger that is used to record transactions across many computers so that any involved record cannot be altered retroactively, without the alteration of all subsequent blocks. How Does It work? Types:
Characteristics.
3
Blockchain in cyber security context. How secure is blockchain? While no system is "unhackable," blockchain's simple topology is the most secure today, according to many security professionals.
4
Confidentiality definition: “the property that sensitive information is not disclosed to unauthorized individuals, entities, or processes”. Blockchain ensures that only authorized people have access to the data. Data Access & Disclosure: If an attacker gains access to a blockchain network and the data, this does not necessarily mean the attacker can read or retrieve the information.
5
Integrity definition: “guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity”. Blockchain’s built in characteristics to ensure Integrity:
6
NIST defines availability as “ensuring timely and reliable access to and use of information”. Attacks against availability:
Blockchain and availability:
7
Threat intelligence is an advanced process which involves gathering valuable insights including mechanisms, context, indicators, actionable advice and implications about an emerging or existing cyberthreat. Threat intelligence processes must be adapted to a company ecosystem to integrate it properly.
One of the most innovative applications of blockchain technologies is to use it by secure storage and recovery systems.
8
Blockchain work like a public ledger. Protocols for Commitment: Ensure that every valid transaction from the clients are committed and included in the Blockchain within a finite time.
privacy and authenticity needs to be ensured.
9
Anonymity of Users’ Identity. The difficulty of efficient and secure sharing of user data among various financial institutions may result in a high cost of repeated user
let the other party know their real identity in some cases Authentication over Insecure Wireless Channels.
10
Blockchain is one of the most trending new age technologies that can be used to improve security. Blockchain and CIA. Blockchain usage:
11
Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain Technology: A Survey on Applications and Security Privacy Challenges. Internet of Things, 100107. doi:10.1016/j.iot.2019.100107 . Kshetri, N. (2017). Blockchain’ s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027–1038. doi:10.1016/j.telpol.2017.09.003. Due.com. (2017).How blockchain improves security and transaction times. Nasdaq. Retrieved fromhttp://www.nasdaq.com/article/how-blockchain-improves-security-and-transaction-times- cm771339
Conference on Intelligent Computing and Control (I2C2), pp. 1-3, 24 June, 2017.
industrial informatics, 10(4):2233–2243, 2014.
12