SlideShare une entreprise Scribd logo
1  sur  8
Blockchain in Cyber Security
blockchainexpert.uk
INTRODUCTION
Cyber-security is one of the major concerns of today's world. We can say no data is 100% safe in the
cyberworld. What we consider safe today may not be helpful tomorrow. There are nearly 4.3 billion
internet users today i.e. amounting to nearly half of the population in the globe. And it is predicted that
there may be more of 6 billion users by 2022. More users more data handling and security is needed.
And most companies and cybersecurity experts face a huge risk in their path. It is anticipated that
cybercrime will cost the world of $6 trillion every year by 2021, up from $3.6 trillion in 2016. Cyber
attacks are increasing nowadays and it is becoming more complex due to the availability of more
sophisticated malware, creating a greater threat to many organizational out their.
Blockchain is considered as today’s security for the web world, still the critics are into exploring its
scalability, sustainability, and security. However, the blockchain’s capacities such as data confidentiality,
integrity, and availability surpasses all the technologies already existing. Blockchain is now considered as
a viable technology when it comes to data security and business transaction.
Here are some of the most prominent uses cases and solutions from blockchain to increase
cybersecurity.
Safe DNS
Domain Name System (DNS) is largely centralized. It makes easy for hackers to get into the system and
make a connection through websites and IP address. By this they are able to crash the system, can steal
data or redirect to scam websites. With this the attack it is also possible to pair DNS attacks with DDoS
attacks and can lead to render an unusable website.
A blockchain system can create a security level to another level. As it is decentralized, it will make
difficult for hackers to find an exact hack point. Every data and other domain information are stored in a
distributed immutable ledger, and it is safeguarded by powerful smart contracts.
Decentralized Storage Solutions
Data security and the efficiency of data has been a serious problem for the organization and individuals
around the world.
Storing the data is not a real issue but keeping it in a secure manner is a great challenge. Centralized
storage are always vulnerable to security breaches, makes it's unsuitable for data security nowadays.
Blockchain is an ideal solution for the centralized storage solution. In order to store the data, Blockchain
uses distributed ledger technology. It is very secure since it uses modern cryptography hashing
algorithm to store data. Blockchain-based cloud storage allows one to store data securely with utmost
efficiency and clear transparency on a network. Blockchain solution provides full control of data with
utmost privacy and security by using the latest data encryption methods. For eg: Friend an open-source
community that is powered by blockchain technology and is built to provide much better solution for
data security. This platform provides digital freedom to internet users. This cloud computing setup
provide much control and security than their centralized server system
Security to Internet of Things(IoT) Devices
IoT security is one such area that is largely concerned with safeguarding and it provides network security
to the connected devices on the internet. IoT devices help hardware devices to connect to the network
and transfer data to better performance of the device. Allowing devices to connect to the internet will
allow them to connect to a more vulnerable system which can lead to serious attacks if the device is
centralized and not properly maintained or protected.
DLT can be used to protect IoT from attackers. IoT devices can be smart enough to maintain security
without relying on a centralized system. For instance, consider some device that can take part in a group
which creates a common consensus regarding how the network to transfer data if anything suspiciously or
any node work against consensus will lock or remove from network. By keeping the IoT device in
blockchain can let the device to attain a real-time data transfer and real-time communication between any
devices from anywhere.
Private Data Security with DLT
More popular internet becomes, a lot of huge data, metadata is collected from each user during each
transaction(on each activity). For instance, suppose a customer uses social media and share his/her like
on some product, the real-time data is watched by other users and they are able to track that and use it
for their own monetary benefits and other purposes.
Many social media started to use end to end encryption to protect the data being transferred.
Currently, most social apps and messaging services are missing a standard set of security protocols, also
they use single platform API for enabling cross-communication. By using blockchain for communication,
transmitting messages is via creating a unified ecosystem.
The main key factor of using blocking in cyber security is that it can provide a secure decentralized
platform. When data is no longer coming from a single point and is secured by certain consensus and
crypto encryption, it makes it much more difficult for the cyber crime activities.
Click here to read more about : Blockchain in Cyber Security
Cybrosys Limited
Alpha House,
100 Borough High Street,
London, Greater London
SE1 1LB, United Kingdom
Thank You !
info@blockchainexpert.uk
Mail UsUK Phone
+44 7414439281

Contenu connexe

Plus de Celine George

Plus de Celine George (20)

How to Make Down Payments in Odoo 17 Sales App
How to Make Down Payments in Odoo 17 Sales AppHow to Make Down Payments in Odoo 17 Sales App
How to Make Down Payments in Odoo 17 Sales App
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Blockchain in cyber security

  • 1. Blockchain in Cyber Security blockchainexpert.uk
  • 2. INTRODUCTION Cyber-security is one of the major concerns of today's world. We can say no data is 100% safe in the cyberworld. What we consider safe today may not be helpful tomorrow. There are nearly 4.3 billion internet users today i.e. amounting to nearly half of the population in the globe. And it is predicted that there may be more of 6 billion users by 2022. More users more data handling and security is needed. And most companies and cybersecurity experts face a huge risk in their path. It is anticipated that cybercrime will cost the world of $6 trillion every year by 2021, up from $3.6 trillion in 2016. Cyber attacks are increasing nowadays and it is becoming more complex due to the availability of more sophisticated malware, creating a greater threat to many organizational out their. Blockchain is considered as today’s security for the web world, still the critics are into exploring its scalability, sustainability, and security. However, the blockchain’s capacities such as data confidentiality, integrity, and availability surpasses all the technologies already existing. Blockchain is now considered as a viable technology when it comes to data security and business transaction.
  • 3. Here are some of the most prominent uses cases and solutions from blockchain to increase cybersecurity. Safe DNS Domain Name System (DNS) is largely centralized. It makes easy for hackers to get into the system and make a connection through websites and IP address. By this they are able to crash the system, can steal data or redirect to scam websites. With this the attack it is also possible to pair DNS attacks with DDoS attacks and can lead to render an unusable website. A blockchain system can create a security level to another level. As it is decentralized, it will make difficult for hackers to find an exact hack point. Every data and other domain information are stored in a distributed immutable ledger, and it is safeguarded by powerful smart contracts. Decentralized Storage Solutions Data security and the efficiency of data has been a serious problem for the organization and individuals around the world.
  • 4. Storing the data is not a real issue but keeping it in a secure manner is a great challenge. Centralized storage are always vulnerable to security breaches, makes it's unsuitable for data security nowadays. Blockchain is an ideal solution for the centralized storage solution. In order to store the data, Blockchain uses distributed ledger technology. It is very secure since it uses modern cryptography hashing algorithm to store data. Blockchain-based cloud storage allows one to store data securely with utmost efficiency and clear transparency on a network. Blockchain solution provides full control of data with utmost privacy and security by using the latest data encryption methods. For eg: Friend an open-source community that is powered by blockchain technology and is built to provide much better solution for data security. This platform provides digital freedom to internet users. This cloud computing setup provide much control and security than their centralized server system
  • 5. Security to Internet of Things(IoT) Devices IoT security is one such area that is largely concerned with safeguarding and it provides network security to the connected devices on the internet. IoT devices help hardware devices to connect to the network and transfer data to better performance of the device. Allowing devices to connect to the internet will allow them to connect to a more vulnerable system which can lead to serious attacks if the device is centralized and not properly maintained or protected. DLT can be used to protect IoT from attackers. IoT devices can be smart enough to maintain security without relying on a centralized system. For instance, consider some device that can take part in a group which creates a common consensus regarding how the network to transfer data if anything suspiciously or any node work against consensus will lock or remove from network. By keeping the IoT device in blockchain can let the device to attain a real-time data transfer and real-time communication between any devices from anywhere.
  • 6. Private Data Security with DLT More popular internet becomes, a lot of huge data, metadata is collected from each user during each transaction(on each activity). For instance, suppose a customer uses social media and share his/her like on some product, the real-time data is watched by other users and they are able to track that and use it for their own monetary benefits and other purposes. Many social media started to use end to end encryption to protect the data being transferred. Currently, most social apps and messaging services are missing a standard set of security protocols, also they use single platform API for enabling cross-communication. By using blockchain for communication, transmitting messages is via creating a unified ecosystem. The main key factor of using blocking in cyber security is that it can provide a secure decentralized platform. When data is no longer coming from a single point and is secured by certain consensus and crypto encryption, it makes it much more difficult for the cyber crime activities.
  • 7. Click here to read more about : Blockchain in Cyber Security
  • 8. Cybrosys Limited Alpha House, 100 Borough High Street, London, Greater London SE1 1LB, United Kingdom Thank You ! info@blockchainexpert.uk Mail UsUK Phone +44 7414439281