Hands-On Cybersecurity
with Blockchain
Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Rajneesh Gupta
BIRMINGHAM - MUMBAI
Hands-On Cybersecurity with Blockchain
Copyright 2018 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
Commissioning Editor: Gebin George
Acquisition Editor: Rohit Rajkumar
Content Development Editor: Ronn Kurien
Technical Editor: Swathy Mohan
Copy Editors: Safis Editing, Dipti Mankame
Project Coordinator: Judie Jose
Proofreader: Safis Editing
Indexer: Aishwarya Gangawane
Graphics: Tom Scaria
Production Coordinator: Shantanu Zagade
First published: June 2018
Production reference: 2191118
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.
ISBN 978-1-78899-018-9
www.packtpub.com
mapt.io
Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.
Why subscribe?
Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
Improve your learning with Skill Plans built especially for you
Get a free eBook or video every month
Mapt is fully searchable
Copy and paste, print, and bookmark content
PacktPub.com
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at service@packtpub.com for more details.
At www.PacktPub.com , you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.
Contributors
About the author
Rajneesh Gupta is a cybersecurity and blockchain expert with a proven track record of helping organizations to build strong cybersecurity solutions. He is an experienced innovator as well as a creative and strategic thinker.
Cited in Insights Success as one of the most trusted cybersecurity leaders and recognized by CIO Review as one of the top 20 cybersecurity players, Rajneesh is a keynote speaker, and he regularly speaks at several conferences about cybersecurity, blockchain, IoT, secure governance, and cyberwarfare.
I would like to thank my friend and colleague, Vinay Pandey, for introducing me to the exciting field of blockchain, and Rohit Rajkumar for this amazing opportunity to write. A very special thanks to Ron Kurien and Swathy Mohan for their countless efforts. Finally, thanks to my wife, Ankita Gupta, for being the most inspiring person in my life.
About the reviewer
Gautam Kumawat is world's youngest cybercrime investigator and self-trained cybersecurity expert. He is helping various prestigious institutions, such as state police, Central Bureau of Investigation, DoD, and the Indian army, training officials and solving complex cybercrime cases. He has also given training to the New York Police Department and Interpol.
His expertise in the cybersecurity industry markedly exceeds the standard number of security assessments, audits, governance, incident response, and forensic projects with big Fortune companies.
Packt is searching for authors like you
If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.
Preface
Blockchain technology is being hailed as one of the most revolutionary and disruptive innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but now has changed the perception of many o rganizations and empowered them to use it, even for storage and the transfer of value.
This book will start by introducing you to the common cyberthreat landscape and common attacks, such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you understand the workings of blockchain technology, Ethereum, and Hyperledger architecture, and how they fit into the cybersecurity ecosystem. These chapters will also help you write your first distributed application on Ethereum blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with b lockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how blockchain plays a crucial role in fundamentally transforming cybersecurity solutions.
Toward the end of the book, you will learn about real-world deployment examples of blockchain in security cases, and also understand the short-term challenges and the future of cybersecurity with blockchain.
Who this book is for
The book is targeted toward cybersecurity professionals, or any stakeholders dealing with cybersecurity who want to understand the next level of securing infrastructure using blockchain. A basic understanding of blockchain would be an added advantage.
What this book covers
, Cyber Threat Landscape and Security Challenges , covers the emerging global cyber threat landscape, what is making threats stronger and more sophisticated, and the defender's perspective, including governments; International Security Alliance (ISA); and industry alliances, corporations, executives,
Next page