dc.contributor.author |
Gupta Rajneesh |
|
dc.date.accessioned |
2024-01-29T22:04:34Z |
|
dc.date.available |
2024-01-29T22:04:34Z |
|
dc.date.issued |
2018 |
|
dc.identifier.citation |
Gupta. Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain - 1 online resource : - URL: https://libweb.kpfu.ru/ebsco/pdf/1841173.pdf |
|
dc.identifier.isbn |
9781788991858 |
|
dc.identifier.isbn |
1788991850 |
|
dc.identifier.uri |
https://dspace.kpfu.ru/xmlui/handle/net/180257 |
|
dc.description |
Includes bibliographical references and index. |
|
dc.description.abstract |
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. |
|
dc.description.tableofcontents |
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. |
|
dc.description.tableofcontents |
Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. |
|
dc.description.tableofcontents |
What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. |
|
dc.description.tableofcontents |
Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. |
|
dc.description.tableofcontents |
Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). |
|
dc.language |
English |
|
dc.language.iso |
en |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Computer networks -- Security measures. |
|
dc.subject.other |
Blockchains (Databases) |
|
dc.subject.other |
Database security. |
|
dc.subject.other |
Denial of service attacks. |
|
dc.subject.other |
COMPUTERS -- Security -- General. |
|
dc.subject.other |
COMPUTERS -- Networking -- Security. |
|
dc.subject.other |
COMPUTERS -- Security -- Online Safety & Privacy. |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Data capture & analysis. |
|
dc.subject.other |
Network security. |
|
dc.subject.other |
Blockchains (Databases) |
|
dc.subject.other |
Computer networks -- Security measures. |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Database security. |
|
dc.subject.other |
Denial of service attacks. |
|
dc.subject.other |
Electronic books. |
|
dc.title |
Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain/ Rajneesh Gupta. |
|
dc.title.alternative |
Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain |
|
dc.type |
Book |
|
dc.description.pages |
1 online resource : |
|
dc.collection |
Электронно-библиотечные системы |
|
dc.source.id |
EN05CEBSCO05C1221 |
|