Электронный архив

Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain/ Rajneesh Gupta.

Показать сокращенную информацию

dc.contributor.author Gupta Rajneesh
dc.date.accessioned 2024-01-29T22:04:34Z
dc.date.available 2024-01-29T22:04:34Z
dc.date.issued 2018
dc.identifier.citation Gupta. Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain - 1 online resource : - URL: https://libweb.kpfu.ru/ebsco/pdf/1841173.pdf
dc.identifier.isbn 9781788991858
dc.identifier.isbn 1788991850
dc.identifier.uri https://dspace.kpfu.ru/xmlui/handle/net/180257
dc.description Includes bibliographical references and index.
dc.description.abstract Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
dc.description.tableofcontents Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches.
dc.description.tableofcontents Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum.
dc.description.tableofcontents What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements.
dc.description.tableofcontents Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality.
dc.description.tableofcontents Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA).
dc.language English
dc.language.iso en
dc.subject.other Computer security.
dc.subject.other Computer networks -- Security measures.
dc.subject.other Blockchains (Databases)
dc.subject.other Database security.
dc.subject.other Denial of service attacks.
dc.subject.other COMPUTERS -- Security -- General.
dc.subject.other COMPUTERS -- Networking -- Security.
dc.subject.other COMPUTERS -- Security -- Online Safety & Privacy.
dc.subject.other Computer security.
dc.subject.other Data capture & analysis.
dc.subject.other Network security.
dc.subject.other Blockchains (Databases)
dc.subject.other Computer networks -- Security measures.
dc.subject.other Computer security.
dc.subject.other Database security.
dc.subject.other Denial of service attacks.
dc.subject.other Electronic books.
dc.title Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain/ Rajneesh Gupta.
dc.title.alternative Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
dc.type Book
dc.description.pages 1 online resource :
dc.collection Электронно-библиотечные системы
dc.source.id EN05CEBSCO05C1221


Файлы в этом документе

Данный элемент включен в следующие коллекции

Показать сокращенную информацию

Поиск в электронном архиве


Расширенный поиск

Просмотр

Моя учетная запись

Статистика