• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Second Line of Defence for Cybersecurity: Blockchain

Ahmed Banafa / 7 min read.
March 12, 2018
Datafloq AI Score
×

Datafloq AI Score: 83.33

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/FAMKV

In the first part we covered AI as the first line of defence for cybersecurity, the goal was to keep the cyber-criminals at bay, but in case they managed to get-in and infiltrate the network we need to initiate the second line of defence; #Blockchain. With the fact that cybercrime and cybersecurity attacks hardly seem to be out of the news these days and the threat is growing globally. Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices. Firms clearly must invest to stay resilient. Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky. But one thing we can be sure about is that the number is big and probably larger than the statistics reveal.

The global figure for cyber breaches had been put at around $200 billion annually.

New blockchain platforms are stepping up to address security concerns in the face of recent breaches. Since these platforms are not controlled by a singular entity, they can help ease the concerns created by a spree of recent breach disclosures. Services built on top of #blockchain have the potential to inspire renewed trust due to the transparency built into the technology. Developments in blockchain have expanded beyond recordkeeping and cryptocurrencies. The integration of smart contract development in blockchain platforms has ushered in a wider set of applications, including cybersecurity.

By using blockchain, transaction details are kept both transparent and secure. Blockchain’s decentralised and distributed network also helps businesses to avoid a single point of failure, making it difficult for malicious parties to steal or tamper with business data.

Transactions in the blockchain can be audited and traced. Also, public blockchains rely on a distributed network to run, thus eliminating a single point of control. For attackers, it is much more difficult to attack a large number of peers distributed globally as opposed to a centralised data centre.

Implementing Blockchain in Cybersecurity

Since a blockchain system is protected with the help of ledgers and cryptographic keys, attacking and manipulating it becomes extremely difficult. Blockchain decentralises the systems by distributing ledger data on several systems rather than storing them on one single network. This allows the technology to focus on gathering data rather than worrying about any data being stolen. Thus, decentralisation has led to improved efficiency in blockchain-operated systems.

For a blockchain system to be penetrated, the attacker must intrude into every system on the network to manipulate the data that is stored on the network. The number of systems stored on every network can be in millions. Since domain editing rights are only given to those who require them, the hacker won’t get the right to edit and manipulate the data even after hacking a million of systems. Since such manipulation of data on the network has never taken place on the blockchain, it is not an easy task for any attacker.

While we store our data on a blockchain system, the threat of a possible hack gets eliminated. Every time our data is stored or inserted into blockchain ledgers, a new block is created. This block further stores a key that is cryptographically created. This key becomes the unlocking key for the next record that is to be stored onto the ledger. In this manner, the data is extremely secure.

Furthermore, the hashing feature of blockchain technology is one of its underlying qualities that makes it such a prominent technology. Using cryptography and the hashing algorithm, blockchain technology converts the data stored in our ledgers. This hash encrypts the data and stores it in such a language that the data can only be decrypted using keys stored in the systems. Other than cybersecurity, blockchain has many applications in several fields that help in maintaining and securing data. The fields where this technology is already showing its ability are finance, supply chain management, and blockchain-enabled smart contracts.

advantages blockchain security

11. Advantages of Using Blockchain in Cybersecurity

The main advantages of blockchain technology for cybersecurity are the following:

1. Decentralization

Thanks to the peer-to-peer network, there’s no need for third-party verification, as any user can see network transactions.

2. Tracking and tracing

All transactions in blockchains are digitally signed and time-stamped, so network users can easily trace the history of transactions and track accounts at any historical moment. This feature also allows a company to have valid information about assets or product distribution.

3. Confidentiality

The confidentiality of network members is high due to the public-key cryptography that authenticates users and encrypts their transactions.

4. Fraud security

In the event of a hack, it’s easy to define malicious behaviour due to the peer-to-peer connections and distributed consensus. As of today, blockchains are considered technically unhackable’, as attackers can impact a network only by getting control of 51% of the network nodes.

5. Sustainability

Blockchain technology has no single point of failure, which means that even in the case of DDoS attacks, the system will operate as normal thanks to multiple copies of the ledger.

6. Integrity

The distributed ledger ensures the protection of data against modification or destruction. Besides, the technology ensures the authenticity and irreversibility of completed transactions. Encrypted blocks contain immutable data that is resistant to hacking.

7. Resilience

The peer-to-peer nature of the technology ensures that the network will operate round-the-clock even if some nodes are offline or under attack. In the event of an attack, a company can make certain nodes redundant and operate as usual.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

8. Data quality

Blockchain technology can’t improve the quality of your data, but it can guarantee the accuracy and quality of data after it’s encrypted in the blockchain.

9. Smart contracts

Software programs that are based on the ledger. These programs ensure the execution of contract terms and verify parties. Blockchain technology can significantly increase the security standards for smart contracts, as it minimises the risks of cyber-attacks and bugs.

10. Availability

There’s no need to store your sensitive data in one place, as blockchain technology allows you to have multiple copies of your data that are always available to network users.

11. Increased customer trust

Your clients will trust you more if you can ensure a high level of data security. Moreover, blockchain technology allows you to provide your clients with information about your products and services instantly.

disadvantages blockchain security

6. Disadvantages of Using Blockchain in Cybersecurity

1. Irreversibility

There’s a risk that encrypted data may be unrecoverable in case a user loses or forgets the private key necessary to decrypt it.

2. Storage limits

Each block can contain no more than 1 Mb of data, and a blockchain can handle only 7 transactions per second on average.

3. Risk of cyber attacks

Though the technology greatly reduces the risk of malicious intervention, it’s still not a panacea to all cyber threats. If attackers manage to exploit the majority of your network, you may lose your entire database.

4. Adaptability challenges

Though blockchain technology can be applied to almost any business, companies may face difficulties integrating it. Blockchain applications can also require complete replacement of existing systems, so companies should consider this before implementing the blockchain technology.

5. High operation costs

Running blockchain technology requires substantial computing power, which may lead to high marginal costs in comparison with existing systems.

6. Blockchain literacy

There are still not enough developers with experience in blockchain technology and with deep knowledge of cryptography.

Conclusion

Blockchain’s decentralised approach to cybersecurity can be seen as a fresh take on the issues that the industry faces today. The market could only use more solutions to combat the threats of cyber attacks. And, the use of blockchain may yet address the vulnerabilities and limitations of current security approaches and solutions.

Throwing constant pots of money at the problem and knee-jerk reactions is not the answer. Firms need to sort out their governance, awareness, organisational culture and critically look at the business purpose and processes before they invest in systems to combat cybercrime.

The roster of these new services provided by Blockchain may be limited for now, and of course, they face incumbent players in the cybersecurity space. But this only offers further opportunity for other ventures to cover other key areas of cybersecurity. Blockchain also transcends borders and nationalities, which should inspire trust in users. And, with the growth of these new solutions, the industry may yet restore some of the public’s trust they may have lost in the midst of all these issues.

Overall, blockchain technology is a breakthrough in cybersecurity, as it can ensure the highest level of data confidentiality, availability, and security. However, the complexity of the technology may cause difficulties with development and real-world use.

Implementation of blockchain applications requires comprehensive, enterprise- and risk-based approaches that capitalise on cybersecurity risk frameworks, best practices, and cybersecurity assurance services to mitigate risks. In addition, cyber intelligence capabilities, such as cognitive security, threat modelling, and artificial intelligence, can help proactively predict cyber threats to create countermeasures, that’s why AI considered as the first line of defence while Blockchain is the second line.

References

  • https://www.ibm.com/blogs/insights-on-business/government/convergence-blockchain-cybersecurity/
  • https://www.forbes.com/sites/rogeraitken/2017/11/13/new-blockchain-platforms-emerge-to-fight-cybercrime-secure-the-future/#25bdc5468adc
  • https://www.technologyrecord.com/Article/cybersecurity-via-blockchain-the-pros-and-cons-62035
  • https://www.allerin.com/blog/blockchain-cybersecurity

All figures: Ahmed Banafa

Categories: Blockchain, Cybersecurity
Tags: blockchain, Public ledger, security, Smart contract

About Ahmed Banafa

Prof. Ahmed Banafa has extensive experience in research, operations and management, with focus on IoT, Blockchain, Cybersecurity and AI. He is a reviewer and a technical contributor for the publication of several technical books. He served as an instructor at well-known universities and colleges, including the Stanford University, University of California, Berkeley; California State University-East Bay; San Jose State University; and University of Massachusetts. He is the recipient of several awards, including Distinguished Tenured Staff Award, Instructor of the year for 4 years in a row, and Certificate of Honor from the City and County of San Francisco. He was named as No.1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018 by LinkedIn, his researches featured in many reputable sites and magazines including Forbes, IEEE and MIT Technology Review, and Interviewed by ABC, CBS, NBC,BBC, NPR and Fox TV and Radio stations. He is a member of MIT Technology Review Global Panel. He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT). He is the author of the books: 'Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI)' , and 'Blockchain Technology and Applications' . Winner of Author & Artist Award 2019 of San Jose State University for "Secure and Smart IoT" Book.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)

March 29, 2023 By mark

Big Data & AI World, Singapore

March 29, 2023 By r.chan

Velocity Data and Analytics Summit, UAE

March 29, 2023 By shiwangi-7725

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data blockchain business China Cloud Companies company costs crypto customers Data development digital environment experience finance future Google+ government information learning machine learning market mobile Musk news public research security share social social media software startup strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Big Data & AI World, Singapore
  • Intel AI Fundamentals
  • Data Platform, Cloud Networking and AI in the Cloud
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)
  • What is Enterprise Application Integration (EAI), and How Should Your Company Approach It?
  • 5 Best Data Engineering Projects & Ideas for Beginners
  • Personalization Vs. Hyper-Personalization: Benefits, Limitations and Potential
  • Explaining data products lifecycle and their scope in management

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data blockchain business China Cloud Companies company costs crypto customers Data development digital environment experience finance future Google+ government information learning machine learning market mobile Musk news public research security share social social media software startup strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!