Please enable JavaScript.
Coggle requires JavaScript to display documents.
Blockchain: Cybersecurity Blockchain_Presentation-2 - Coggle Diagram
Blockchain: Cybersecurity
-
Technical
Access Control
-
Identification
-
Zero-Knowledge Proof
-
-
-
See also: "Yao's Millionaires' problem" (Liu et al., 2017)
-
-
-
-
-
Technical Assessment
Scalability :fire:
Computing Power
:warning: Quantum Computing (Fernández-Caramés, & Fraga-Lamas, 2020),
-
-
-
But also: potential to improve security and privacy (Zeuner et al., 2021) :recycle:
-
-
Storage (Xu & Huang, 2019)
-
-
-
-
-
Speed
-
Transaction Speed (Fu et al., 2020)
-
-
-
-
Data Integrity
-
-
Especially important with smart contracts: piece of code, automatically acting upon the terms of a contract
-
-
-
-
According to Deloitte, more than 84% of businesses expect blockchain to offer better security when it comes to conventional IT systems
-
-
Data Quality
Key Data
-
-
-
Credentials
-
= Set of multiple identity attributes and an identity attribute is a piece of information about an identity
Blockchains only recognize and take responsibility for the quality and accuracy of data entered into the blockchain system :warning: (Benisi, Aminian & Javadi, 2020)
Data deletions, modifications & corrections :question:
Blockchain itself is immutable, therefore indexing & external database
-
-
-
-
High Byzantine Fault Tolerance (Fernández-Caramés & Fraga-Lamas, 2020)
-
Data Security & Privacy
Threats
Cyber // Hacking Attacks
51% Attack
-
-
-
-
= Attack on a blockchain by a group of miners who control more than 50% of the network's mining hash rate
-
-
-
Forks
-
-
= When there exists two or more versions of an existing protocol of piece of software (sharing the same history)
-
-
-
-
-
-
Risk Prevention
Strong security features
-
Strong firewall setting (carefully selected white list and very limitied access for employees) (Hasanova et al., 2019)
-
-
-
-
-
-
-
Rank-Weight Methods (e.g. CyFEr) (Gourisetti, Mylrea & Patangia, 2019)
-
Only carefully selectes vendors (if at all) (Shi et al., 2021)
-
The more people (nodes) on the network, the more difficult to subvert veracity :check:
-
-
-
-
-
-
General Characteristics (Not immediately relevant for the issues of cybersecurity but important to know in order to understand the underlying technology namely blockchain) In addition to this, the inherent complexity :explode: needs to be emphasised.
-
Distributed Ledger Technology (DLT) (amongst others: Benisi, Aminian & Javadi, 2020; Gao et al., 2018; Nakamoto, 2018)
Decentralised
100%: Permissionless, Public, Shared Systems
Less than 80%: Permissioned, Public, Shared Systems
Less than 50%: Permissioned, Private, Shared Systems
-
-
-
-
-
-
-
-
-
-
-