SlideShare a Scribd company logo
2
Most read
7
Most read
12
Most read
APPLICATION OF
BLOCKCHAIN IN CYBER
SECURITY
Name- Prateek Panda
Class- MTech(CSE)
CONTENTS:
o Introduction
o Blockchain In Cyber Security
o Types of Cyber Security
o Major Cyber Attacks
o How Blockchain Will Transform Cyber Security?
o Application Of Blockchain In Cyber Security
o Advantages of Blockchain in Cyber Security
o Future of Blockchain-based Cyber Security
o Conclusion
09-10-2020
Prateek Panda/Cyber Security in Blockchain
2
INTRODUCTION
• As the world goes online and people relays on the
Internet for their routine processes and habits, it is
essential to maintain the security of online data.
Blockchain, a notable buzzword of recent days has
taken charges to secure online data.
• Once blockchain technology has been introduced,
the focus is on the fulfilment of the information
security properties it provides. Focusing on data
integrity, blockchain ledger is immutable.
09-10-2020Prateek Panda/Cyber Security in Blockchain 3
BLOCKCHAIN IN CYBER SECURITY
• Blockchain is a booming technology that
boosts every business and industry verticals.
As the count of cybercriminals increases
complex and are endlessly trying to steal
valuable data like financial data, health
records, intellectual property, and personal
identifiable information.
09-10-2020Prateek Panda/Cyber Security in Blockchain 4
TYPES OF CYBER SECURITY
• Basically the major types of cyber security involve the following :
1. Cloud security
2. Application security
3. Critical infrastructure security
4. Internet of things (IoT) security
5. Network security .
09-10-2020Prateek Panda/Cyber Security in Blockchain 5
MAJOR CYBER ATTACKS
• The most common types of cyber attacks that happen often are as follows:
1. Phishing attacks
2. Cross-site scripting (XSS) attack
3. Denial-of-service (DoS) and distributed denial-of- service (DDoS) attacks .
09-10-2020Prateek Panda/Cyber Security in Blockchain 6
HOW BLOCKCHAIN WILL TRANSFORM CYBER
SECURITY?
These are the following application by which block chain transfer Cyber Security.
They are as Follows:
09-10-2020Prateek Panda/Cyber Security in Blockchain
7
APPLICATION OF BLOCKCHAIN IN CYBER
SECURITY
1. A Decentralized Storage Medium :
As we people move faster with online, it is very necessary to make a safer
environment for all the personal information that we share on a medium
(computer or internet ). Most of the business still use a centralized medium
for its data storage, which makes it easier for hackers to reach data for stealing.
Since Blockchain-based decentralized storage medium can prevent business
data theft and hacks.
09-10-2020Prateek Panda/Cyber Security in Blockchain 8
CONTINUE….
2. Security in DNS :
Most of the DNS is centralized and hackers can break the connections between
a domain name and IP address and can also make the website unavailable.
Hackers in recent days try to pair DNS attacks with DDoS attacks to render
websites unusable for a certain period of time.
Using blockchain technology can make it difficult for hackers as your data or
information are stored immutable on a decentralized, distributed ledger and
immutable smart contracts are present to power connections.
09-10-2020Prateek Panda/Cyber Security in Blockchain 9
CONTINUE….
3. Securing Edge Devices via Identity Authentication:
Edge devices present especially vulnerable access points into core networks.
One example is an employee who logs into their company’s servers via their
own unsecured phone. For a hacker, penetrating an entire network through a
blatant vulnerability via an edge device is like taking candy from a baby.
Ensuring that these devices, as well as the core network itself, are insulated
with multi-step authentication processes and blockchain-level, decentralized
threat mitigation protocols is the first step in patching some of the most
obvious network entry points that hackers could exploit.
09-10-2020Prateek Panda/Cyber Security in Blockchain 10
ADVANTAGES OF BLOCKCHAIN IN CYBER
SECURITY
• Let me list a lot more benefits of using blockchain technology to prevent cyber
attacks/crime.
1. Distribution of Public Key and Multi-Signature Logins.
2. Provides Decentralizing Data Storage that Removes Honey Pot.
3. Mitigating Denial-of-Service (DDoS) Attacks.
4. Easy Verification of the Validity of Software Downloads / Updates.
5. Provenance for Computer Hardware for Prevention of Foreign Intrusion.
09-10-2020Prateek Panda/Cyber Security in Blockchain 11
FUTURE OF BLOCKCHAIN-BASED CYBER
SECURITY
• Blockchain technology can be utilized to prevent any type of data breaches, identity
thefts, cyber-attacks or false transactions ensuring data privacy and security.
• As days pass, the rate of Cybercriminals is raising which In turns create jobs for
security professionals over the next few years. It is the blockchain technology that
tends to be the saviour of data security.
• Cyber Security will be boosted double the amount of cybercriminals rate, only when
blockchain technology has been used as a medium of data storage.
09-10-2020Prateek Panda/Cyber Security in Blockchain 12
CONCLUSION
• Blockchain technology is a
breakthrough in cyber security,
as it can ensure the highest level of
data confidentiality, availability,
and security. However, the
complexity of the technology may
cause difficulties with development
and real-world use.
09-10-2020Prateek Panda/Cyber Security in Blockchain 13
09-10-2020Prateek Panda/Cyber Security in Blockchain

More Related Content

PPTX
What is the future of blockchain in cybersecurity
Blockchain Council
 
PPTX
Blockchain in cyber security
zaarahary
 
PPTX
Blockchain and Cybersecurity
gppcpa
 
PPTX
Blockchain Security
Munawar Hussain
 
PDF
Blockchain Security and Privacy
Anil John
 
PDF
Understanding Blockchain Security
ITU
 
PPT
The blockchain technology
Sandeep Wakchaure
 
PDF
Blockchain Security Issues and Challenges
Merlec Mpyana
 
What is the future of blockchain in cybersecurity
Blockchain Council
 
Blockchain in cyber security
zaarahary
 
Blockchain and Cybersecurity
gppcpa
 
Blockchain Security
Munawar Hussain
 
Blockchain Security and Privacy
Anil John
 
Understanding Blockchain Security
ITU
 
The blockchain technology
Sandeep Wakchaure
 
Blockchain Security Issues and Challenges
Merlec Mpyana
 

What's hot (20)

PDF
Blockchain Technology Fundamentals
Experfy
 
PPTX
The Blockchain and the Future of Cybersecurity
Kevin Cedeño, CISM, CISA
 
PPTX
Introduction to Blockchain
AIMDek Technologies
 
PPTX
Ppt on blockchain technology
RATAN AGARWALA
 
PPTX
BLOCK CHAIN
Saima Mustafa
 
PPTX
Blockchain Introduction Presentation
Amr Alaa Yassen
 
PPTX
FOG COMPUTING
Saisharan Amaravadhi
 
PDF
Blockchain: The New Technology and Its Applications for Libraries
Bohyun Kim
 
PPTX
Cybersecurity 2 cyber attacks
sommerville-videos
 
PDF
Security in Cyber-Physical Systems
Bob Marcus
 
PPTX
Cyber security and current trends
Shreedeep Rayamajhi
 
PDF
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
PPTX
Cyber security
Rishav Sadhu
 
PPTX
Cyber Security in Society
Rubal Sagwal
 
PPTX
Blockchain ppt
Wajihawaseem
 
PPTX
Blockchain
PedramDehghanpour
 
PPTX
Blockchain Technology
Mithileysh Sathiyanarayanan
 
PPTX
Block chain technology and its applications
ABHISHEK JAIN
 
PPTX
Blockchain technology ppt
asrithak
 
Blockchain Technology Fundamentals
Experfy
 
The Blockchain and the Future of Cybersecurity
Kevin Cedeño, CISM, CISA
 
Introduction to Blockchain
AIMDek Technologies
 
Ppt on blockchain technology
RATAN AGARWALA
 
BLOCK CHAIN
Saima Mustafa
 
Blockchain Introduction Presentation
Amr Alaa Yassen
 
FOG COMPUTING
Saisharan Amaravadhi
 
Blockchain: The New Technology and Its Applications for Libraries
Bohyun Kim
 
Cybersecurity 2 cyber attacks
sommerville-videos
 
Security in Cyber-Physical Systems
Bob Marcus
 
Cyber security and current trends
Shreedeep Rayamajhi
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
Cyber security
Rishav Sadhu
 
Cyber Security in Society
Rubal Sagwal
 
Blockchain ppt
Wajihawaseem
 
Blockchain
PedramDehghanpour
 
Blockchain Technology
Mithileysh Sathiyanarayanan
 
Block chain technology and its applications
ABHISHEK JAIN
 
Blockchain technology ppt
asrithak
 
Ad

Similar to Blockchain in cyber security (20)

PDF
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
PDF
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PPTX
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
PPTX
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
PDF
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
PDF
How Blockchain Ensures Data Security & Prevents Cyber Attacks
dmthetatechnolabs
 
PDF
Blockchain and Cybersecurity-Liveplex Report.pdf
Liveplex
 
PDF
Blockchain for CyberSecurity | Blockchain and CyberSecurity
feriuyolasyolas
 
PPTX
Blockchain Advances & its Applications.pptx
MohamedMansour421585
 
PPTX
PPT 1.pptxjajwwjwksksjssjshsjsjsjsjsjsjsjjsjsjssjsjdjshshshsh
skunjan845
 
PPTX
Blockchain Cybersecurity L Detailed.pptx
tahakhan699813
 
PPTX
Blockchain Technology
Aryan Chaudhary
 
PPTX
Blockchain technology algorithms and DLT
vaishalikhairnar4
 
PPTX
Blockchain technology (1).pptx
RUSHIKHEMANTBHAIPATE
 
PDF
Blockchain technology.pptx
ARNAV PATEL
 
PPTX
5 Industries that Blockchain will Disrupt | Blockchain Technology | Blockchai...
Simplilearn
 
PPTX
PPT for seminar.pptxhhsksksshdusjskssjsgssjsksk
skunjan845
 
PPTX
Role of blockchain technology in critical infrastructure security
Global Tech Council
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
How Blockchain Ensures Data Security & Prevents Cyber Attacks
dmthetatechnolabs
 
Blockchain and Cybersecurity-Liveplex Report.pdf
Liveplex
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
feriuyolasyolas
 
Blockchain Advances & its Applications.pptx
MohamedMansour421585
 
PPT 1.pptxjajwwjwksksjssjshsjsjsjsjsjsjsjjsjsjssjsjdjshshshsh
skunjan845
 
Blockchain Cybersecurity L Detailed.pptx
tahakhan699813
 
Blockchain Technology
Aryan Chaudhary
 
Blockchain technology algorithms and DLT
vaishalikhairnar4
 
Blockchain technology (1).pptx
RUSHIKHEMANTBHAIPATE
 
Blockchain technology.pptx
ARNAV PATEL
 
5 Industries that Blockchain will Disrupt | Blockchain Technology | Blockchai...
Simplilearn
 
PPT for seminar.pptxhhsksksshdusjskssjsgssjsksk
skunjan845
 
Role of blockchain technology in critical infrastructure security
Global Tech Council
 
Ad

Recently uploaded (20)

PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Software Development Methodologies in 2025
KodekX
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Doc9.....................................
SofiaCollazos
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 

Blockchain in cyber security

  • 1. APPLICATION OF BLOCKCHAIN IN CYBER SECURITY Name- Prateek Panda Class- MTech(CSE)
  • 2. CONTENTS: o Introduction o Blockchain In Cyber Security o Types of Cyber Security o Major Cyber Attacks o How Blockchain Will Transform Cyber Security? o Application Of Blockchain In Cyber Security o Advantages of Blockchain in Cyber Security o Future of Blockchain-based Cyber Security o Conclusion 09-10-2020 Prateek Panda/Cyber Security in Blockchain 2
  • 3. INTRODUCTION • As the world goes online and people relays on the Internet for their routine processes and habits, it is essential to maintain the security of online data. Blockchain, a notable buzzword of recent days has taken charges to secure online data. • Once blockchain technology has been introduced, the focus is on the fulfilment of the information security properties it provides. Focusing on data integrity, blockchain ledger is immutable. 09-10-2020Prateek Panda/Cyber Security in Blockchain 3
  • 4. BLOCKCHAIN IN CYBER SECURITY • Blockchain is a booming technology that boosts every business and industry verticals. As the count of cybercriminals increases complex and are endlessly trying to steal valuable data like financial data, health records, intellectual property, and personal identifiable information. 09-10-2020Prateek Panda/Cyber Security in Blockchain 4
  • 5. TYPES OF CYBER SECURITY • Basically the major types of cyber security involve the following : 1. Cloud security 2. Application security 3. Critical infrastructure security 4. Internet of things (IoT) security 5. Network security . 09-10-2020Prateek Panda/Cyber Security in Blockchain 5
  • 6. MAJOR CYBER ATTACKS • The most common types of cyber attacks that happen often are as follows: 1. Phishing attacks 2. Cross-site scripting (XSS) attack 3. Denial-of-service (DoS) and distributed denial-of- service (DDoS) attacks . 09-10-2020Prateek Panda/Cyber Security in Blockchain 6
  • 7. HOW BLOCKCHAIN WILL TRANSFORM CYBER SECURITY? These are the following application by which block chain transfer Cyber Security. They are as Follows: 09-10-2020Prateek Panda/Cyber Security in Blockchain 7
  • 8. APPLICATION OF BLOCKCHAIN IN CYBER SECURITY 1. A Decentralized Storage Medium : As we people move faster with online, it is very necessary to make a safer environment for all the personal information that we share on a medium (computer or internet ). Most of the business still use a centralized medium for its data storage, which makes it easier for hackers to reach data for stealing. Since Blockchain-based decentralized storage medium can prevent business data theft and hacks. 09-10-2020Prateek Panda/Cyber Security in Blockchain 8
  • 9. CONTINUE…. 2. Security in DNS : Most of the DNS is centralized and hackers can break the connections between a domain name and IP address and can also make the website unavailable. Hackers in recent days try to pair DNS attacks with DDoS attacks to render websites unusable for a certain period of time. Using blockchain technology can make it difficult for hackers as your data or information are stored immutable on a decentralized, distributed ledger and immutable smart contracts are present to power connections. 09-10-2020Prateek Panda/Cyber Security in Blockchain 9
  • 10. CONTINUE…. 3. Securing Edge Devices via Identity Authentication: Edge devices present especially vulnerable access points into core networks. One example is an employee who logs into their company’s servers via their own unsecured phone. For a hacker, penetrating an entire network through a blatant vulnerability via an edge device is like taking candy from a baby. Ensuring that these devices, as well as the core network itself, are insulated with multi-step authentication processes and blockchain-level, decentralized threat mitigation protocols is the first step in patching some of the most obvious network entry points that hackers could exploit. 09-10-2020Prateek Panda/Cyber Security in Blockchain 10
  • 11. ADVANTAGES OF BLOCKCHAIN IN CYBER SECURITY • Let me list a lot more benefits of using blockchain technology to prevent cyber attacks/crime. 1. Distribution of Public Key and Multi-Signature Logins. 2. Provides Decentralizing Data Storage that Removes Honey Pot. 3. Mitigating Denial-of-Service (DDoS) Attacks. 4. Easy Verification of the Validity of Software Downloads / Updates. 5. Provenance for Computer Hardware for Prevention of Foreign Intrusion. 09-10-2020Prateek Panda/Cyber Security in Blockchain 11
  • 12. FUTURE OF BLOCKCHAIN-BASED CYBER SECURITY • Blockchain technology can be utilized to prevent any type of data breaches, identity thefts, cyber-attacks or false transactions ensuring data privacy and security. • As days pass, the rate of Cybercriminals is raising which In turns create jobs for security professionals over the next few years. It is the blockchain technology that tends to be the saviour of data security. • Cyber Security will be boosted double the amount of cybercriminals rate, only when blockchain technology has been used as a medium of data storage. 09-10-2020Prateek Panda/Cyber Security in Blockchain 12
  • 13. CONCLUSION • Blockchain technology is a breakthrough in cyber security, as it can ensure the highest level of data confidentiality, availability, and security. However, the complexity of the technology may cause difficulties with development and real-world use. 09-10-2020Prateek Panda/Cyber Security in Blockchain 13