Показать сокращенную информацию
dc.contributor.author | Gupta Rajneesh | |
dc.date.accessioned | 2024-01-29T22:04:34Z | |
dc.date.available | 2024-01-29T22:04:34Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Gupta. Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain - 1 online resource : - URL: https://libweb.kpfu.ru/ebsco/pdf/1841173.pdf | |
dc.identifier.isbn | 9781788991858 | |
dc.identifier.isbn | 1788991850 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180257 | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. | |
dc.description.tableofcontents | Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. | |
dc.description.tableofcontents | Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. | |
dc.description.tableofcontents | What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. | |
dc.description.tableofcontents | Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. | |
dc.description.tableofcontents | Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). | |
dc.language | English | |
dc.language.iso | en | |
dc.subject.other | Computer security. | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | Blockchains (Databases) | |
dc.subject.other | Database security. | |
dc.subject.other | Denial of service attacks. | |
dc.subject.other | COMPUTERS -- Security -- General. | |
dc.subject.other | COMPUTERS -- Networking -- Security. | |
dc.subject.other | COMPUTERS -- Security -- Online Safety & Privacy. | |
dc.subject.other | Computer security. | |
dc.subject.other | Data capture & analysis. | |
dc.subject.other | Network security. | |
dc.subject.other | Blockchains (Databases) | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | Computer security. | |
dc.subject.other | Database security. | |
dc.subject.other | Denial of service attacks. | |
dc.subject.other | Electronic books. | |
dc.title | Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain/ Rajneesh Gupta. | |
dc.title.alternative | Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain | |
dc.type | Book | |
dc.description.pages | 1 online resource : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1221 |