Secure Chains: Cybersecurity and Blockchain-powered Automation

· ·
· BPB Publications
Ebook
354
pagine

Informazioni su questo ebook

Understand Cybersecurity fundamentals and protect your Blockchain systems for a scalable and secured automation


KEY FEATURES Ê

Understand the fundamentals of Cryptography and Cybersecurity and the fundamentals of Blockchain and their role in securing the various facets of automation. Also understand threats to Smart contracts and Blockchain systems.

Understand areas where blockchain and cybersecurity superimpose to create amazing problems to solve.

A dedicated part of the book on Standards and Frameworks allows you to be industry-ready in information security practices to be followed in an organization.

Learn the very lucrative areas of Smart Contract Security, Auditing, and Testing in Blockchain.

Finish to build a career in cybersecurity and blockchain by being Industry 4.0 ready.


DESCRIPTIONÊ

As this decade comes to a closure, we are looking at, what we like to call, an Industry 4.0. This era is expected to see radical changes in the way we work and live, due to huge leaps and advancements with technologies such as Blockchain and Quantum Computing. This calls for the new age workforce to be industry-ready, which essentially means an understanding of the core fields of Cybersecurity, Blockchain, and Quantum Computing is becoming imperative.

This book starts with a primer on the ÒEssentials of CybersecurityÓ. This part allows the reader to get comfortable with the concepts of cybersecurity that are needed to gain a deeper understanding of the concepts to follow. The next part gives a similar primer on the ÒEssentials of BlockchainÓ. These two parts at the beginning of the book allow this book to be easily followed by beginners as well. The following parts delve into the concepts, where we see a ÒSuperimposition of Cybersecurity and BlockchainÓ, and the concepts and situations where we may see and understand amazing problems that systems in the current world face day in and day out. This book puts immense emphasis on helping the reader know about the Standards and Frameworks needed to be put in place to make an organization work seamlessly. Towards the end, a part dedicated to Smart Contract Security, Auditing, and Testing in Blockchain provides knowledge about what is one of the most lucrative career options and has vital importance in the field of Blockchain. Conclusively, the book tries well to make the reader ÒIndustry 4.0-readyÓ, helping them in traversing through the upcoming decade of significant career options.

Ê

WHAT WILL YOU LEARNÊ

By the end of the book, you should be able to understand the gravity of the concepts involved in technologies like Blockchain and Cybersecurity, with an acute understanding of the areas, such as Quantum Computing, which affect the technologies. You will also know about the tools used in Smart Contract Auditing and Testing in Blockchain. You should be able to make a career in blockchain and associated technologies going forward.


WHO THIS BOOK IS FORÊÊ

This book is meant for everyone who wishes to build a career in blockchain and/or cybersecurity. The book doesnÕt assume prior knowledge on any of the topics; hence a beginner from any diverse field might definitely give these technologies a try by reading this book. The book is divided into parts that take the reader seamlessly from beginner concepts to advanced practices prevalent in the industry. No prior programming experience is assumed either. Familiarity with the basic web technologies would help, though it is not mandatory to follow this book.


Table of Contents

Preface

Introduction

Why Did We Write This Book?

Part 1. Essentials of Cryptography

Introduction

Chapter 1: Cryptography Techniques

Introduction

Key Length

Key Management

Algorithmic Principles

Usage

Chapter 2: Cryptography Protocols

Introduction

Basic Components of Cryptographic Protocols

Security Applications of Cryptographic Protocols

Categories of Cryptographic Protocols

Chapter 3: Algorithms and Modes

Introduction

Behind the Scene Mathematics

Block Ciphers

Stream Ciphers

One-Way Hash Functions

Public-Key Algorithms

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

X.509 Certificates

Public-Key Infrastructure (PKI)

Cryptographic Attacks

Key-Exchange Algorithms

Elliptic Curve Cryptography (ECC)

Digital Signatures With Encryption

Data Encryption Standard (DES)

Secure Hash Algorithm (SHA)

Message Digest Algorithms (MD5)

Rivest, Shamir, Adleman (RSA)

Zero-Knowledge Proofs

Elliptical Curve Digital Signature Algorithm (ECDSA)

Probabilistic Encryption

Quantum Cryptography


Part 2. Essentials of Blockchain


Introduction

What is Blockchain?

The Need for Decentralization

Demystifying Disintermediation Principles in Blockchain Architectures


Chapter 4: Introduction: Distributed Consensus & Consensus Mechanisms

Proof of Work (PoW)

Proof of Stake (PoS)

Proof of Elapsed Time (PoET)

Byzantine Fault Tolerance (BFT) and Variants

Federated Byzantine Agreement

Ripple Consensus Protocol Algorithm

Stellar Consensus Protocol

Delegated Proof of Stake (DPoS)

Chapter 5: Types of Blockchain

Public Blockchain

Private Blockchain

Federated or Permissioned Blockchain

Chapter 6: Key Considerations for Blockchain Implementations

Scalability

Interoperability

Sustainability

Contracts

Currency

Application


Chapter 7 : Strategic Roadmap for Digital Enterprise Adoption

Convergence of Principles

Legacy of Cypherpunks

Digital Enterprise Use Cases

Digital Transformation Perspective

Decentralized Operating Models

Prominent Trust Patterns

Major Challenges and Constraints


Chapter 8: Blockchain Ð The New Generation Tool for Cybersecurity

Blockchain with Turin Complete State Machine

Private and Consortium/Permissioned BlockchainsÊ

Overview of Security Tools in Blockchain

Vulnerabilities in Blockchain Security

Challenges to the Growth of Blockchain Eco-system


Part 3: The Superimposition of Blockchain and Cybersecurity


Chapter 9: Cyberattack Prevention Strategies

Evolution of Security

Endpoint Detection and Response (EDR)

Deception Technology

Cyberthreat Intelligence (CTI)

Deploying Blockchain-based DDoS


Chapter 10: Blockchain-based Security Mechanisms

Blockchain-based DNS Alternatives

Public Key Cryptography

PKI Components and Functions

Decentralizing the PKI System

Deploying Blockchain-based PKI Identity Mechanisms

Multi-Factor Authentication with Blockchain

Blockchain-based Interaction Model for Security


Chapter 11: Threats for Blockchain systems


Cyberthreats with Public and Permissioned Blockchains

Major Potential Attacks on Blockchain Networks


Chapter 12: Practical Implementations and Use Cases

IBM ADEPT Platform

Digital Identity as a Distributed Data Structure

Cyber-liability Management: A Connected Car Use Case

A Smart Home Security Implementation Use Case


Chapter 13: Security in Popular Public Blockchain Networks

Project in Discussion: Corda

Point-to-Point TLS-encrypted Communications

Security using Notary Trust

Pluggable Consensus Mechanism


Chapter 14: Cryptography as a Digital Labor for the Integration of Distributed Finance

New Generation Payment Infrastructure Powering Secure Global Finance

Libra

JP Money

Ripple

Stellar Lumens


Part 4: Standards and Frameworks


Chapter 15: ISO 27001

ISO 27001

Introduction

Scope

Terms and Definitions

Structure

Information Security Policies

Organization of Information Security

Human Resource Security

Asset Management

Access Control

Cryptography

Physical and Environmental Security

Operations Security

Communications Security

Supplier Relationships

Information Security Incident Management

Implementation of ISO 27001 in Organizations

Chapter 16:

NIST

Introduction to NIST and HIPAA

HIPAA Security Rule

NIST and its role in Information Security

A Framework for Managing Risk

HIPAA Risk Assessment Requirements


Part 5: Smart Contract Security, Auditing and Testing in Blockchain


Chapter 17: Smart Contract Auditing

Why is a Security Audit Necessary

Types of Smart Contracts

Smart Contract Vulnerabilities and Known Attacks

Ownership Attack

Re-entrancy Attack

Underflow and Overflow Attacks

Short Address Attack

Storage Injection Vulnerability

Risks in ICO Crowdfunding Smart Contracts

An Ideal Audit Process


Chapter 18: Testing in Blockchain

Blockchain Attacks

Network Attacks

User Wallet Attacks

Transaction Verification Mechanism Attacks

Mining Pool Attacks

Security Testing Phases in Blockchain

Testing Framework

Quality Issues in Blockchain

Practices and Governing Mechanisms

Popular Tools for Testing


Part 6: Blockchain Power Automation for Industry 4.0


Chapter 19: Risks posed by the ÔSmartÕ Economy ParadigmsÊ

Zigbee Chain Reaction Attack

Controlling Drones through Blockchain for Security & Auditing

Securing Robots through Blockchain

Secured Access and Management of Automobiles using Blockchain

ÊÊ

ÊChapter 20: Summary & Conclusion:

ÊA Safer and Secure World with Blockchain-based Solutions

Valuta questo ebook

Dicci cosa ne pensi.

Informazioni sulla lettura

Smartphone e tablet
Installa l'app Google Play Libri per Android e iPad/iPhone. L'app verrà sincronizzata automaticamente con il tuo account e potrai leggere libri online oppure offline ovunque tu sia.
Laptop e computer
Puoi ascoltare gli audiolibri acquistati su Google Play usando il browser web del tuo computer.
eReader e altri dispositivi
Per leggere su dispositivi e-ink come Kobo e eReader, dovrai scaricare un file e trasferirlo sul dispositivo. Segui le istruzioni dettagliate del Centro assistenza per trasferire i file sugli eReader supportati.