• Complain

Rajneesh Gupta [Rajneesh Gupta] - Hands-On Cybersecurity with Blockchain

Here you can read online Rajneesh Gupta [Rajneesh Gupta] - Hands-On Cybersecurity with Blockchain full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Packt Publishing, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Rajneesh Gupta [Rajneesh Gupta] Hands-On Cybersecurity with Blockchain

Hands-On Cybersecurity with Blockchain: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hands-On Cybersecurity with Blockchain" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

About This Book
  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • Understanding real-world deployment of blockchain based applications
Who This Book Is For

The book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.

What You Will Learn
  • Understand the cyberthreat landscape
  • Learn about Ethereum and Hyperledger Blockchain
  • Program Blockchain solutions
  • Build Blockchain-based apps for 2FA, and DDoS protection
  • Develop Blockchain-based PKI solutions and apps for storing DNS entries
  • Challenges and the future of cybersecurity and Blockchain
In Detail

Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the worlds most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.

This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions.

Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain.

Style and approach

This book will follow a practical approach to help understand blockchain technology to transform cybersecurity solutions

Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Rajneesh Gupta [Rajneesh Gupta]: author's other books


Who wrote Hands-On Cybersecurity with Blockchain? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hands-On Cybersecurity with Blockchain — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hands-On Cybersecurity with Blockchain" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Availability in the current blockchain network

On-time and reliable access to information resembles availability. Cyberattacks such as DDoS cause huge disruption to internet services and result in websites becoming inaccessible, which costs businesses a lot of money. The decentralization nature of blockchain makes it harder to disrupt these applications.

PC Cyborg

In 1989, a trojan named PC Cyborg was discovered that had the capability of hiding folders and then encrypting the name of the files in the C drive. The victim then had to pay $189 to the PC Cyborg corporation, which was registered at Panama post office.

Understanding blockchain on confidentiality

Every digitally connected technology comes with the cost of security challenges, and these challenges can be about privacy exposure, confidentiality breaches, identity theft, and many more. Blockchain technology is a computing technology that runs over a digital ecosystem and hence it becomes important to pay attention to its fundamental security challenges. Every size of business connected globally allocates an annual budget for cyber security so that they can keep their information and critical assets confidential. Let's understand the extent of confidentiality in the current blockchain model and its future roadmap.

Hyperledger overview

Hyperledger is an open source initiative focused on covering core industry needs with distributed ledger technologies. It's a group program hosted by The Linux Foundation in collaboration with several industry giants in information technology, banking, logistics, transportation, finance, manufacturing, and IoT.

Although cryptocurrency is still struggling to gain trust with several government and corporate bodies, blockchain is being adopted as a key to secure business operations and management technology. Because of the rigid and static nature of Bitcoin, it can't be used for business application purposes. Although Ethereum has the capability of turning up business applications with its smart contracts, because of its permissionless use cases, financial institutes and other critical business operations have hesitated to try the Ethereum blockchain.

Hyperledger is the only distributed ledger technology framework that was built to be granular for businesses that were in need of permissioned blockchains to achieve better control over an entire system. Hyperledger does not support any cryptocurrency platform or related system, as it is more about solving critical business problems.

Founded in December 2015, Hyperledger has been appreciated and adopted by several industry leaders such as Accenture, Airbus, American Express, Cisco, Fujitsu, Hitachi, IBM, Intel, SAP, NEC, BBVA, Bitmark, Bosch, CA Technologies, Capgemini, EY, Factom, H3C, NSE, Oracle, PwC, Redhat, Samsung, Ripple, Thales, Wipro, the Cloud Security Alliance, and many more.

The Hyperledger project is also planned for collaboration between every blockchain enthusiast, blockchain communities, corporates, and nonprofit organizations with a single and comprehensive standard of building distributed ledger applications. In the way that WordPress revolutionized the method and turn-up time for a website, Hyperledger is on its way to reducing the cost and overall time in turning up a distributed ledger application.

Chapter 3
  1. No, it can't be used for business applications because applications need to be programmed based on several requirements. Bitcoin blockchain is built to be rigid in nature, making it impractical for business applications.
  2. The future of Ethereum depends on its industry adaptation and then the ether. Although in the current situation, the Ethereum market doesn't look that stable but it has got potential to thrive in the market for long-term business opportunity. The founder of Ethereum is several ways to improve the existing consensus and make it a more energy-efficient solution to mine Ether.
Decentralized infrastructure

Blockchain is about achieving a decentralized network of multiple participants without third-party involvement. A decentralized public key infrastructure (DPKI) is an innovative concept that achieves authentication systems over public systems without depending on a single third party that can compromise the integrity and security of the system. As we already know, blockchain is built with a trustless approach that allows both trusted and untrusted parties to communicate with each other. However, trust is usually established among geographically and politically disparate participants with several consensus models for the state of the ledger. By definition, blockchain allows you to store any kind of value with several nodes in the network. With DPKI, this value will be a form of secret properties.

A principal can be given direct control over global readable identifiers, like a website domain, by registering the identifier in the blockchain. With the key-value database, the principal uses the identifier as the lookup key. Blockchain can allow the assignment of confidential assets, such as public keys and other attributes, and permit these values to be globally readable in a secure manner that can't be compromised by any MITM, which is possible in PKIX. This is accomplished by allowing the most correct public key to link with the identifier value, and authentication is performed by an identifier lookup to the latest public key.

In this design of DPKI, the system remains decentralized, and the control over the identifier remains with the principal and eliminates the risk of the identifier data store getting compromised.

Chapter 1
  1. There are several open standard and proprietary ways to accomplish the state of being updated with adversary capabilities. MITRE's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is one of the widely used frameworks for cyber adversary patterns, reflecting the various phases of an adversary's life cycle and the platforms they are known to target. MITRE has developed three categories to determine an adversary's capabilities mainlypre-attack, attack for enterprise, and attack mobile profile.
  2. Cyber threat intelligence starts with collecting massive data and information. It includes stepsestablishing an intelligence priority framework, collaborating intelligence sources, consulting with threat intelligence experts, and then coming to a conclusion on the solution.
  3. There are several technologies knocking at the door almost every quarter however, it is important to understand the effectiveness and purpose of a specific technology before it can be given a chance. Security stakeholders should take part in privately-held security conferences and popular public forums include the RSA Conference, Black Hat Conference, DEFCON Hacking Conference, Cloud Security Expo, SANS Summit, Infosecurity Europe, World Cybersecurity Congress, Infosec World, the International Conference on Cybersecurity, and many more. CISO and CSO should also consider joining some of the independent security research companies, such as Gartner and Forrester.
Certificate authority (CA)

The CA is a trusted third-party that certifies that users, servers, databases, and administrators are who they say they are. The CA checks the credentials of users and grants the certificate, signing it with a secret key. The CA can be an on-premises solution or it can be a managed solution that offers certificate services, illustrated as follows:

The functions of the CA are as follows Issuing and delivering certificates - photo 1
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hands-On Cybersecurity with Blockchain»

Look at similar books to Hands-On Cybersecurity with Blockchain. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hands-On Cybersecurity with Blockchain»

Discussion, reviews of the book Hands-On Cybersecurity with Blockchain and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.