Document Type
|
:
|
BL
|
Record Number
|
:
|
856600
|
Main Entry
|
:
|
Gupta, Rajneesh
|
Title & Author
|
:
|
Hands-on cybersecurity with Blockchain : : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /\ Rajneesh Gupta.
|
Publication Statement
|
:
|
Birmingham, UK :: Packt Publishing,, [2018]
|
|
:
|
, ©2018
|
Page. NO
|
:
|
1 online resource :: illustrations
|
ISBN
|
:
|
1788990188
|
|
:
|
: 1788991850
|
|
:
|
: 9781788990189
|
|
:
|
: 9781788991858
|
|
:
|
9781788990189
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches.
|
|
:
|
Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA).
|
|
:
|
Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum.
|
|
:
|
Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality.
|
|
:
|
What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements.
|
Abstract
|
:
|
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
|
Subject
|
:
|
Blockchains (Databases)
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Database security.
|
Subject
|
:
|
Denial of service attacks.
|
Subject
|
:
|
Blockchains (Databases)
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Networking-- Security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
COMPUTERS-- Security-- Online Safety Privacy.
|
Subject
|
:
|
Data capture analysis.
|
Subject
|
:
|
Database security.
|
Subject
|
:
|
Denial of service attacks.
|
Subject
|
:
|
Network security.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25G87 2018
|
Parallel Title
|
:
|
Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
|