SlideShare a Scribd company logo
What makes BlockChain secure?
Security in computing
What is
BlockChain?
➔ A blockchain is a distributed database which is shared among the nodes
of a computer network.
➔ It collects information in group & stores it as a block, once a block
capacity is full, each block gets attached to a chain of data known as
blockchain.
➔ Blockchains are best known for their crucial role in cryptocurrency
systems, to manage and track records of transactions.
Core
strategies
Cryptography
➔ Blockchain applications leverage the concept of real-world signatures by
leveraging cryptography techniques along with encryption keys.
➔ Cryptography methods utilize advanced mathematical codes for the
storage and transmission of data values in secure formats.
➔ Cryptography serves confidentiality to the owner of data or transactions.
Public-key cryptography
Decentralisation
➔ The Decentralization refers to the transfer of control and decision-making
from a centralized entity (individual, organization, or group thereof) to a
distributed network.
➔ Decentralized networks strive to reduce the level of trust that participants
must place in one another, and deter their ability to exert authority or
control over one another in ways that degrade the functionality of the
network.
Consensus
➔ The transactions in blockchain technology are executed only when the
parties present on the network anonymously approve the same.
➔ One may even choose to alter the consensus-based regulations to match
the circumstances.
Key characteristics of
Blockchain security
➔ Blockchain is undeniably a measure that ensures security.
➔ It has become a disruptive technology due to its ability to centralize,
incentivize, digitize, and secure the transactions validation.
➔ Blockchain has the potential to simplify business processes and give
them access to enhanced performance and security.
Distributed
➔ The blockchain technology evenly distributes the processing
among all business peers.
➔ With Developing a shared infrastructure within the business
system.
➔ Participants can independently validate the details without any
centralized authority.
Immutable
➔ The blockchain transactions in the blockchain-based technology
are immutable.
➔ Even the code encryption is done for the transactions,
effectively covering the participants’ date, time, and information.
Digital Signature
➔ The blockchain technology streamlines the exchange of
translational values with unique digital signatures that depend
on public keys.
➔ In blockchain technology, private key codes are known only to
the key owners to develop ownership proof.
➔ It is a critical feature that avoids any fraud in blockchain record
management.
Persistent
➔ The blockchain technology invalid transaction detected by the
consensus-based system.
➔ It isn’t easy to roll back the transactions once they are integrated
into the blockchain ledger.
➔ Cryptographically, blockchain blocks are created and sealed
inside the chain, making it difficult for the hackers to edit or
delete already developed blocks and put them on the network.
Is BlockChain really
secure?
Conclusion
➔ Blockchain Technology has presented its potential for conventional
transformer industries with its key features like- persistence,
decentralization, audibility, etc.
➔ Blockchain offers highly enhanced security during transactions
irrespective of its value, also makes it a highly unique and universal
solution to streamline legal contracts and Enterprise transparency.
➔ https://www.upgrad.com/blog/what-makes-blockchain-secure/
➔ https://www.slideshare.net/
➔ https://medium.com/@naresh.kurada/thoughts-on-security-
architecture-for-enterprise-permissiond-blockchain-applications-
f71d5529a438
➔ https://101blockchains.com/blockchain-cryptography/
References
“
Thank You !

More Related Content

What's hot

Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
EC-Council
 
Distributed Ledger Technology
Distributed Ledger TechnologyDistributed Ledger Technology
Distributed Ledger Technology
Kriti Katyayan
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New World
ITU
 
Cryptocurrencies
CryptocurrenciesCryptocurrencies
Cryptocurrencies
Dave Kelleher
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
Blockchain Council
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
ITU
 
Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in Libraries
Nabi Hasan
 
Distributed Systems for Blockchain using Cloud
Distributed  Systems for Blockchain  using CloudDistributed  Systems for Blockchain  using Cloud
Distributed Systems for Blockchain using Cloud
Hridyesh Bisht
 
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | SysforeIs Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Sysfore Technologies
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts
Blockchain Council
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Scott Strang
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
Celine George
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
Ishaan Bhardwaj
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
Aayt Bahaa
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
Blockchain
BlockchainBlockchain
Blockchain
Mehul jadav
 
Introduction to Blockchain and Recordkeeping
Introduction to Blockchain and RecordkeepingIntroduction to Blockchain and Recordkeeping
Introduction to Blockchain and Recordkeeping
Peter Van Garderen
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Rashi Singh
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Ingo Weber
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
Syed Bukhari
 

What's hot (20)

Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Distributed Ledger Technology
Distributed Ledger TechnologyDistributed Ledger Technology
Distributed Ledger Technology
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New World
 
Cryptocurrencies
CryptocurrenciesCryptocurrencies
Cryptocurrencies
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in Libraries
 
Distributed Systems for Blockchain using Cloud
Distributed  Systems for Blockchain  using CloudDistributed  Systems for Blockchain  using Cloud
Distributed Systems for Blockchain using Cloud
 
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | SysforeIs Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to Blockchain and Recordkeeping
Introduction to Blockchain and RecordkeepingIntroduction to Blockchain and Recordkeeping
Introduction to Blockchain and Recordkeeping
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
 

Similar to What makes BlockChain secure.pptx

BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
Rajasekhar364622
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
EC-Council
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
Akanksha Verma
 
Blockchain's Role in Data Security.pptx
Blockchain's Role in Data Security.pptxBlockchain's Role in Data Security.pptx
Blockchain's Role in Data Security.pptx
avinash996974
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
Bluechip Technologies
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain
 
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
Blockchain Technology | A Comprehensive Guide by Webtrack TechnologiesBlockchain Technology | A Comprehensive Guide by Webtrack Technologies
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
Webtrack Technologies
 
What is blockchain for beginner
What is blockchain for beginner What is blockchain for beginner
What is blockchain for beginner
CryptoReachApp
 
A Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various TypesA Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various Types
FutureSkills Prime
 
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfHow Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
Pixel Softwares
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
SoluLab1231
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
ChelladuraiBose1
 
How Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain JigsawHow Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain Jigsaw
Cognizant
 
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtrCG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
Anup464706
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now
101 Blockchains
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain TechnologyRajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
Arjun Singh
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 

Similar to What makes BlockChain secure.pptx (20)

BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Blockchain's Role in Data Security.pptx
Blockchain's Role in Data Security.pptxBlockchain's Role in Data Security.pptx
Blockchain's Role in Data Security.pptx
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
Blockchain Technology | A Comprehensive Guide by Webtrack TechnologiesBlockchain Technology | A Comprehensive Guide by Webtrack Technologies
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
 
What is blockchain for beginner
What is blockchain for beginner What is blockchain for beginner
What is blockchain for beginner
 
A Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various TypesA Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various Types
 
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfHow Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
How Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain JigsawHow Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain Jigsaw
 
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtrCG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain TechnologyRajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

What makes BlockChain secure.pptx

  • 1. What makes BlockChain secure? Security in computing
  • 2. What is BlockChain? ➔ A blockchain is a distributed database which is shared among the nodes of a computer network. ➔ It collects information in group & stores it as a block, once a block capacity is full, each block gets attached to a chain of data known as blockchain. ➔ Blockchains are best known for their crucial role in cryptocurrency systems, to manage and track records of transactions.
  • 4. Cryptography ➔ Blockchain applications leverage the concept of real-world signatures by leveraging cryptography techniques along with encryption keys. ➔ Cryptography methods utilize advanced mathematical codes for the storage and transmission of data values in secure formats. ➔ Cryptography serves confidentiality to the owner of data or transactions.
  • 6. Decentralisation ➔ The Decentralization refers to the transfer of control and decision-making from a centralized entity (individual, organization, or group thereof) to a distributed network. ➔ Decentralized networks strive to reduce the level of trust that participants must place in one another, and deter their ability to exert authority or control over one another in ways that degrade the functionality of the network.
  • 7. Consensus ➔ The transactions in blockchain technology are executed only when the parties present on the network anonymously approve the same. ➔ One may even choose to alter the consensus-based regulations to match the circumstances.
  • 8. Key characteristics of Blockchain security ➔ Blockchain is undeniably a measure that ensures security. ➔ It has become a disruptive technology due to its ability to centralize, incentivize, digitize, and secure the transactions validation. ➔ Blockchain has the potential to simplify business processes and give them access to enhanced performance and security.
  • 9. Distributed ➔ The blockchain technology evenly distributes the processing among all business peers. ➔ With Developing a shared infrastructure within the business system. ➔ Participants can independently validate the details without any centralized authority.
  • 10. Immutable ➔ The blockchain transactions in the blockchain-based technology are immutable. ➔ Even the code encryption is done for the transactions, effectively covering the participants’ date, time, and information.
  • 11. Digital Signature ➔ The blockchain technology streamlines the exchange of translational values with unique digital signatures that depend on public keys. ➔ In blockchain technology, private key codes are known only to the key owners to develop ownership proof. ➔ It is a critical feature that avoids any fraud in blockchain record management.
  • 12. Persistent ➔ The blockchain technology invalid transaction detected by the consensus-based system. ➔ It isn’t easy to roll back the transactions once they are integrated into the blockchain ledger. ➔ Cryptographically, blockchain blocks are created and sealed inside the chain, making it difficult for the hackers to edit or delete already developed blocks and put them on the network.
  • 13.
  • 14.
  • 16. Conclusion ➔ Blockchain Technology has presented its potential for conventional transformer industries with its key features like- persistence, decentralization, audibility, etc. ➔ Blockchain offers highly enhanced security during transactions irrespective of its value, also makes it a highly unique and universal solution to streamline legal contracts and Enterprise transparency.
  • 17. ➔ https://www.upgrad.com/blog/what-makes-blockchain-secure/ ➔ https://www.slideshare.net/ ➔ https://medium.com/@naresh.kurada/thoughts-on-security- architecture-for-enterprise-permissiond-blockchain-applications- f71d5529a438 ➔ https://101blockchains.com/blockchain-cryptography/ References