Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding r
Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain
โ Scribed by Rajneesh Gupta
- Publisher
- Packt
- Year
- 2018
- Tongue
- English
- Leaves
- 221
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Contents......Page 3
Preface......Page 9
Cyber Threat Landscape & Security Challenges......Page 13
Current threat landscape......Page 14
Defender perspectives......Page 23
Live attack execution......Page 27
Summary......Page 33
Further reading......Page 34
The security ecosystem......Page 35
The zero-trust approach......Page 37
The assume breach approach......Page 38
Questions......Page 39
Further reading......Page 40
What is blockchain?......Page 41
Internet versus blockchain......Page 44
How blockchain works......Page 46
The building blocks of blockchain......Page 47
Ethereum......Page 58
Private versus public blockchain......Page 78
Business adaptation......Page 80
Summary......Page 81
Further reading......Page 82
Hyperledger โ Blockchain for Businesses......Page 83
Hyperledger overview......Page 84
Blockchain-as-a-service (BaaS)......Page 85
Architecture and core components......Page 86
Hyperledger Fabric model......Page 87
Bitcoin versus Ethereum versus Hyperledger......Page 93
Lab......Page 95
Questions......Page 102
What is the CIA security triad?......Page 103
Understanding blockchain on confidentiality......Page 105
Blockchain on integrity......Page 106
Understanding blockchain on availability......Page 108
Questions......Page 109
Further reading......Page 110
PKI......Page 111
Challenges of the existing PKI model......Page 128
How can blockchain help?......Page 129
Lab......Page 131
Summary......Page 135
Further reading......Page 136
What is 2FA?......Page 137
Blockchain for 2FA......Page 141
Lab......Page 144
Summary......Page 150
Further reading......Page 151
DNS......Page 152
Understanding DNS components......Page 153
DNS structure and hierarchy......Page 155
DNS topology for large enterprises......Page 160
Challenges with current DNS......Page 162
Blockchain-based DNS solution......Page 163
Lab on Ethereum-based secure DNS infrastructure......Page 164
Further reading......Page 175
Deploying Blockchain-based DDoS Protection......Page 176
DDoS attacks......Page 177
Types of DDoS attacks......Page 184
Challenges with current DDoS solutions......Page 189
Lab......Page 190
Further reading......Page 198
Facts about Blockchain & Cyber Security......Page 199
Decision path for blockchain......Page 200
Leader's checklist......Page 204
Challenges with blockchain......Page 205
The future of cybersecurity with blockchain......Page 206
Questions......Page 207
Further reading......Page 208
Chapter 1: Cyber Threat Landscape and Security Challenges......Page 209
Chapter 3: Introducing Blockchain and Ethereum......Page 210
Chapter 6: Deploying PKI-Based Identity with Blockchain......Page 211
Chapter 8: Blockchain-Based DNS Security Platform......Page 212
Chapter 10: Facts about Blockchain and Cyber Security......Page 213
Index......Page 214
๐ SIMILAR VOLUMES
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deplo
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deplo
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Tw
<span><p><b>Develop blockchain application with step-by-step instructions, working example and helpful recommendations</b></p><b>About This Book</b><ul><li>Understanding the blockchain technology from the cybersecurity perspective</li><li>Developing cyber security solutions with Ethereum blockchain