Page 37 - Geektime Blockchain Report
P. 37

Here are some possible uses for blockchain-based cyber security
solutions:
1 Preventing harm to critical
infrastructure
Blockchain-distributed node structure
structure
structure
helps prevent hacking of critical
infrastructure
In October 2016 we saw how multiple distributed Denial of Service Attacks (DDoS attacks) on on one company caused paralysis of key sites such as Twitter Netflix PayPal and others for a a a a few good hours That was just one example of of the flood of of DDoS attacks we’ve seen in recent years Blockchain-distributed node structure
can reduce
the probability of successful hacking A decentralized DNS system will never fail due to multiple requests Distributed transparent DNS where domain records are under the the control of their owner will make it nearly impossible for one entity including governments to manipulate records as as they please Blockchain also reduces the need for network costs associated with DNS reading so so that the costs left are those associated with updates and new registrations This lessens the the pressure on on the the physical backbone of the internet 2 Protection of identities
Blockchain’s unique IDs prevent identity fraud and man-in-the-middle attacks One of the most popular ways to protect identities
is by using a a public public key infrastructure
(PKI) A PKI PKI binds public public keys with respective identities
of entities
entities
It's used to facilitate the secure electronic transfer of information for for a a a range of network activities However it it relies on third- party certificate authorities (CAs) which are centralized: This makes it easier to invent false keys and man-in-the- middle attacks The blockchain allows companies to remove central authorities from the the equation and use the the block to specify as a a a a distributed register of domains and the associated public keys This eliminates the risk of fake keys and allows apps to verify the the identity of people they communicate with Another option is to use blockchain to to store hashes of issued and revoked certificates This means users have a a a a way to verify the the identity of the the certificates through a a a a distributed transparent source It is possible to perform key verification and signatures on local copies of blockchains and therefore optimize access to networks 3 Guaranteeing the integrity of data
Blockchain makes it almost impossible to manipulate identity information without being caught At present we usually sign documents and files using private keys so that recipients and users can verify the the the source of the the the information they receive There’s a a challenge in in proving that the keys weren’t tampered with that's hard because the the key should be be confidential in the the first place Blockchain replaces secrets with transparency It is possible to divide the evidence in in so many blockchain nodes that it is almost impossible to manipulate the information without being caught 37
Industries















































































   35   36   37   38   39