SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Blockchain In
Cyber Security
www.bitdeal.net
Introduction
As the world goes online and people relays on the Internet for their
routine processes and habits, it is essential to maintain the security of
online data. Blockchain, a notable buzzword of recent days has taken
charges to secure online data.
Cyber Security - What is it ?
Cyber Security is the collections of techniques or methods to protect
computers, data, coding, and networks,etc., from access or attack by
unauthorized sources. Cyber Security is also known as Information
Technology Security or Computer Security that protects data or information.
In short, the protection against the theft of data in computers and the Internet
is termed as Cyber Security.
Cyber Criminals: A person who commits cyber crimes ie., using a computer or
online medium as a tool and target to steal data.
Types of Cyber Security
The major types of cyber security involve the following
1. Cloud security
2. Application security
3. Critical infrastructure security
4. Internet of things (IoT) security
5. Network security and so on.
Major Cyber Attacks
The most common types of cyber attacks that happen often are as follows:
1. Phishing attacks
2. Cross-site scripting (XSS) attack
3. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks and
a lot more.
Challenges in Cyber Security
1. Protecting centralized Data
As data is stored in a centralized medium, it becomes a big challenge for cyber
security industry to protect all the data from hackers.
2. Preventing Data Theft
Current cyber security faces a lack of trust among business individuals as it
finds much difficult to prevent data theft.
3. False Data Entry Prevention
As storage is centralized, it requires many verification steps by the human to
prevent false data entry or data modifications.
Blockchain In Cyber Security
Blockchain is a booming technology that boosts every business and industry
verticals. As the count of cybercriminals increases complex and are endlessly
trying to steal valuable data like financial data, health records, intellectual
property, and personal identifiable information, so on.
So, Blockchain could potentially enhance cyber-defense that prevent
fraudulent activities through consensus mechanisms and detect data theft
depending on utilizing its characteristics such as data encryption, auditability,
operational resilience, immutability, and transparency.
Use-Cases Of Blockchain In Cyber Security
1. A Decentralized Storage Medium
As we people move faster with online, it is very necessary to make a safer
environment for all the personal information that we share on a medium (
computer or internet ). Most of the business still use a centralized medium for
its data storage, which makes it easier for hackers to reach data for stealing.
Since Blockchain-based decentralized storage medium can prevent business
data theft and hacks. When using blockchain
Use-Cases Of Blockchain In Cyber Security
2. Security in DNS
Most of the DNS is centralized and hackers can break the connections
between a domain name and IP address and can also make the website
unavailable. Hackers in recent days try to pair DNS attacks with DDoS attacks
to render websites unusable for a certain period of time.
Using blockchain technology can make it difficult for hackers as your data or
information are stored immutable on a decentralized, distributed ledger and
immutable smart contracts are present to power connections.
Benefits of Blockchain in Cyber Security
1. Distribution of Public Key and Multi-Signature Logins
2. Provides Decentralizing Data Storage that Removes Honey Pot.
3. Mitigating Denial-of-Service (DDoS) Attacks
4. Easy Verification of the Validity of Software Downloads / Updates
5. Provenance for Computer Hardware for Prevention of Foreign Intrusion.
Know more use-cases of Blockchain in Cybersecurity !!
Future of Blockchain-based Cyber Security
Blockchain technology can be utilized to prevent any type of data breaches,
identity thefts, cyber-attacks or false transactions ensuring data privacy and
security.
As days pass, the rate of Cybercriminals is raising which inturns create jobs for
security professionals over the next few years. It is the blockchain technology
that tends to be the savior of data security.
Cyber Security will be boosted double the amount of cybercriminals rate, only
when blockchain technology has been used as a medium of data storage.

Weitere ähnliche Inhalte

Was ist angesagt?

System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain EconomicsMelanie Swan
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainBlockchain Council
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technologyRATAN AGARWALA
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain Economics
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchain
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technology
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 

Ähnlich wie Blockchain Cyber Security Title

Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityBlockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityferiuyolasyolas
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdfCuion Technologies
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecuritySoluLab1231
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 

Ähnlich wie Blockchain Cyber Security Title (20)

Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityBlockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdf
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
cyber security
cyber security cyber security
cyber security
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 

Mehr von zaarahary

Metaverse Business Ideas 2023
Metaverse Business Ideas 2023Metaverse Business Ideas 2023
Metaverse Business Ideas 2023zaarahary
 
NFT Restaurant Marketplace Development.pptx
NFT Restaurant Marketplace Development.pptxNFT Restaurant Marketplace Development.pptx
NFT Restaurant Marketplace Development.pptxzaarahary
 
NFT Lending Platform Development.pptx
NFT Lending Platform Development.pptxNFT Lending Platform Development.pptx
NFT Lending Platform Development.pptxzaarahary
 
Sleep-to-Earn NFTs
Sleep-to-Earn NFTsSleep-to-Earn NFTs
Sleep-to-Earn NFTszaarahary
 
Metaverse Real Estate Development.pptx
Metaverse Real Estate Development.pptxMetaverse Real Estate Development.pptx
Metaverse Real Estate Development.pptxzaarahary
 
Metaverse Token Development
Metaverse Token DevelopmentMetaverse Token Development
Metaverse Token Developmentzaarahary
 
Amazing facts about nfts.pdf
Amazing facts about nfts.pdfAmazing facts about nfts.pdf
Amazing facts about nfts.pdfzaarahary
 
NFT Ticketing
NFT TicketingNFT Ticketing
NFT Ticketingzaarahary
 
Secondlive Clone.pdf
Secondlive Clone.pdfSecondlive Clone.pdf
Secondlive Clone.pdfzaarahary
 
What is Copy Trading ?
What is Copy Trading ?What is Copy Trading ?
What is Copy Trading ?zaarahary
 
DAO Development Company.pptx
DAO Development Company.pptxDAO Development Company.pptx
DAO Development Company.pptxzaarahary
 
DAO enabled NFT Marketplace Development.pdf
DAO enabled NFT Marketplace Development.pdfDAO enabled NFT Marketplace Development.pdf
DAO enabled NFT Marketplace Development.pdfzaarahary
 
Cryptokitties Clone Script
Cryptokitties Clone ScriptCryptokitties Clone Script
Cryptokitties Clone Scriptzaarahary
 
Top 10 metaverse platfroms 2022
Top 10 metaverse platfroms 2022Top 10 metaverse platfroms 2022
Top 10 metaverse platfroms 2022zaarahary
 
Why start an exchange like lbc
Why start an exchange like lbcWhy start an exchange like lbc
Why start an exchange like lbczaarahary
 
Why start an exchange like lbc
Why start an exchange like lbcWhy start an exchange like lbc
Why start an exchange like lbczaarahary
 
Fintech app development
Fintech app developmentFintech app development
Fintech app developmentzaarahary
 
Nft staking platform development
Nft staking platform developmentNft staking platform development
Nft staking platform developmentzaarahary
 
What is GameFi?
What is GameFi?What is GameFi?
What is GameFi?zaarahary
 
Metaverse roadmap
Metaverse roadmapMetaverse roadmap
Metaverse roadmapzaarahary
 

Mehr von zaarahary (20)

Metaverse Business Ideas 2023
Metaverse Business Ideas 2023Metaverse Business Ideas 2023
Metaverse Business Ideas 2023
 
NFT Restaurant Marketplace Development.pptx
NFT Restaurant Marketplace Development.pptxNFT Restaurant Marketplace Development.pptx
NFT Restaurant Marketplace Development.pptx
 
NFT Lending Platform Development.pptx
NFT Lending Platform Development.pptxNFT Lending Platform Development.pptx
NFT Lending Platform Development.pptx
 
Sleep-to-Earn NFTs
Sleep-to-Earn NFTsSleep-to-Earn NFTs
Sleep-to-Earn NFTs
 
Metaverse Real Estate Development.pptx
Metaverse Real Estate Development.pptxMetaverse Real Estate Development.pptx
Metaverse Real Estate Development.pptx
 
Metaverse Token Development
Metaverse Token DevelopmentMetaverse Token Development
Metaverse Token Development
 
Amazing facts about nfts.pdf
Amazing facts about nfts.pdfAmazing facts about nfts.pdf
Amazing facts about nfts.pdf
 
NFT Ticketing
NFT TicketingNFT Ticketing
NFT Ticketing
 
Secondlive Clone.pdf
Secondlive Clone.pdfSecondlive Clone.pdf
Secondlive Clone.pdf
 
What is Copy Trading ?
What is Copy Trading ?What is Copy Trading ?
What is Copy Trading ?
 
DAO Development Company.pptx
DAO Development Company.pptxDAO Development Company.pptx
DAO Development Company.pptx
 
DAO enabled NFT Marketplace Development.pdf
DAO enabled NFT Marketplace Development.pdfDAO enabled NFT Marketplace Development.pdf
DAO enabled NFT Marketplace Development.pdf
 
Cryptokitties Clone Script
Cryptokitties Clone ScriptCryptokitties Clone Script
Cryptokitties Clone Script
 
Top 10 metaverse platfroms 2022
Top 10 metaverse platfroms 2022Top 10 metaverse platfroms 2022
Top 10 metaverse platfroms 2022
 
Why start an exchange like lbc
Why start an exchange like lbcWhy start an exchange like lbc
Why start an exchange like lbc
 
Why start an exchange like lbc
Why start an exchange like lbcWhy start an exchange like lbc
Why start an exchange like lbc
 
Fintech app development
Fintech app developmentFintech app development
Fintech app development
 
Nft staking platform development
Nft staking platform developmentNft staking platform development
Nft staking platform development
 
What is GameFi?
What is GameFi?What is GameFi?
What is GameFi?
 
Metaverse roadmap
Metaverse roadmapMetaverse roadmap
Metaverse roadmap
 

Kürzlich hochgeladen

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Kürzlich hochgeladen (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 

Blockchain Cyber Security Title

  • 2. Introduction As the world goes online and people relays on the Internet for their routine processes and habits, it is essential to maintain the security of online data. Blockchain, a notable buzzword of recent days has taken charges to secure online data.
  • 3. Cyber Security - What is it ? Cyber Security is the collections of techniques or methods to protect computers, data, coding, and networks,etc., from access or attack by unauthorized sources. Cyber Security is also known as Information Technology Security or Computer Security that protects data or information. In short, the protection against the theft of data in computers and the Internet is termed as Cyber Security. Cyber Criminals: A person who commits cyber crimes ie., using a computer or online medium as a tool and target to steal data.
  • 4. Types of Cyber Security The major types of cyber security involve the following 1. Cloud security 2. Application security 3. Critical infrastructure security 4. Internet of things (IoT) security 5. Network security and so on.
  • 5. Major Cyber Attacks The most common types of cyber attacks that happen often are as follows: 1. Phishing attacks 2. Cross-site scripting (XSS) attack 3. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks and a lot more.
  • 6. Challenges in Cyber Security 1. Protecting centralized Data As data is stored in a centralized medium, it becomes a big challenge for cyber security industry to protect all the data from hackers. 2. Preventing Data Theft Current cyber security faces a lack of trust among business individuals as it finds much difficult to prevent data theft. 3. False Data Entry Prevention As storage is centralized, it requires many verification steps by the human to prevent false data entry or data modifications.
  • 7. Blockchain In Cyber Security Blockchain is a booming technology that boosts every business and industry verticals. As the count of cybercriminals increases complex and are endlessly trying to steal valuable data like financial data, health records, intellectual property, and personal identifiable information, so on. So, Blockchain could potentially enhance cyber-defense that prevent fraudulent activities through consensus mechanisms and detect data theft depending on utilizing its characteristics such as data encryption, auditability, operational resilience, immutability, and transparency.
  • 8. Use-Cases Of Blockchain In Cyber Security 1. A Decentralized Storage Medium As we people move faster with online, it is very necessary to make a safer environment for all the personal information that we share on a medium ( computer or internet ). Most of the business still use a centralized medium for its data storage, which makes it easier for hackers to reach data for stealing. Since Blockchain-based decentralized storage medium can prevent business data theft and hacks. When using blockchain
  • 9. Use-Cases Of Blockchain In Cyber Security 2. Security in DNS Most of the DNS is centralized and hackers can break the connections between a domain name and IP address and can also make the website unavailable. Hackers in recent days try to pair DNS attacks with DDoS attacks to render websites unusable for a certain period of time. Using blockchain technology can make it difficult for hackers as your data or information are stored immutable on a decentralized, distributed ledger and immutable smart contracts are present to power connections.
  • 10. Benefits of Blockchain in Cyber Security 1. Distribution of Public Key and Multi-Signature Logins 2. Provides Decentralizing Data Storage that Removes Honey Pot. 3. Mitigating Denial-of-Service (DDoS) Attacks 4. Easy Verification of the Validity of Software Downloads / Updates 5. Provenance for Computer Hardware for Prevention of Foreign Intrusion. Know more use-cases of Blockchain in Cybersecurity !!
  • 11. Future of Blockchain-based Cyber Security Blockchain technology can be utilized to prevent any type of data breaches, identity thefts, cyber-attacks or false transactions ensuring data privacy and security. As days pass, the rate of Cybercriminals is raising which inturns create jobs for security professionals over the next few years. It is the blockchain technology that tends to be the savior of data security. Cyber Security will be boosted double the amount of cybercriminals rate, only when blockchain technology has been used as a medium of data storage.