SlideShare a Scribd company logo
What Makes
Blockchain
Secure
Key Characteristics & Security
Architecture
Copyright EC-Council 2020. All Rights Reserved.​
3 Core Strategies
Cryptography
Decentralisation
Consensus
Blockchain solutions are specially crafted to
be tamper-proof and are highly secure
Key Characteristics of
Blockchain Security​
• Blockchain is undeniably a measure that ensures security. It has become a disruptive technology
due to its ability to centralize, incentivize, digitize, and secure the transactions’ validation.
The records are protected through cryptography decentralization to ensure the fool proof blockchain
security of the blocks.
• Many sectors are evaluating blockchain Technology for detecting the strategic differentiation to
leverage their business potential. Blockchain has the potential to simplify business processes and
give them access to enhanced performance and security.
• Every transaction in this technology that gets recorded and stored is not directly labelled as a
blockchain.
1. Distributed
Distributed blockchain technology evenly
distributes the processing among all business
peers, developing a shared infrastructure
within the business system. Participants can
independently validate the details without any
centralized
authority.
2. Immutable
In this, all the blockchain transactions in the
blockchain-based technology are immutable.
Even the code encryption is done for
the transactions, effectively covering the
participants’ date, time, and information.
3. Consensus-Based
The transactions in blockchain technology are
executed only when the parties present on the
network anonymously approve the same.
One may even choose to alter the consensus-
based regulations to match the circumstances.
4. Digital Signature
This blockchain technology streamlines the exchange
of translational values with unique digital signatures
that depend on public keys. In blockchain technology,
private key codes are known only to the key owners to
develop ownership proof. It is a critical feature that
avoids any fraud in blockchain record management.
5. Persistent
Persistent blockchain technology invalid transaction
detected by the consensus-based system. It isn’t easy to
roll back the transactions once they are integrated into the
blockchain ledger. Cryptographically, blockchain blocks are
created and sealed inside the chain, making it difficult for
the hackers to edit or delete already developed blocks
and put them on the network.
Security Architecture in
the Blockchain Technology
• The blockchain records are protected through cryptography, where network users have their own
private and secure keys.
• This key is assigned directly to the transaction keys, and it acts as a personalized digital signature.
Blockchain safeguards and prevents any malicious attack and secures the data of the company
by encrypting it.
• This technology enables enterprises to separate their responsibilities and roles. It also helps them
to protect confidential information without compromising access to any privileged user.
• Blockchain is empowered at many layers for developing any enterprise application.
Layers of Security
Architecture​
User access layer
Presentation layer
Identity and access
management layer
Application layer
Network layer
Infrastructure layer
Blockchain
Security Architecture
PC
Laptop
Smart Phone
Tablet
Terminal
User Sessions
Laptop
Smart Phone
Tablet
Terminal
Enterprise User
Identity
User Access
Controls
Certificates
Smart
Contracts
Blockchain
Protocol
Consensus
Algorithms
Denial of
Service
Data in Motion
SSL, TLS
Audit Trail
Data
Monitoring
User & Activity
Monitoring
User
Access
Presentation
Layer
Identity and
Access
Management
Application/
Data Layer
Network
Layer
Infrastructure
Layer
Blockchain technology is specially designed to pay off in the long run.
Blockchain has irreversible and highly encrypted data blocks that allow us
to fight against any fraudulent conduct.
Conclusion
Thanks for Watching!
Want to learn blockchain?
Join the next batch of Blockchain Training at EC-Council

More Related Content

What's hot (20)

PDF
Blockchain Study(1) - What is Blockchain?
Fermat Jade
 
PPTX
Write Smart Contracts with Truffle Framework
Shun Shiku
 
PPTX
What is merkle tree
Celine George
 
PDF
Blockchain Fundamentals - Top Rated for Beginners
101 Blockchains
 
PPTX
Blockchain Technology
Rashi Singh
 
PDF
An Introduction to Blockchain
NexThoughts Technologies
 
PPTX
Hyperledger Fabric
Murughan Palaniachari
 
PPTX
The Blockchain - The Technology behind Bitcoin
Jérôme Kehrli
 
PDF
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
PDF
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Gautam Anand
 
PDF
An Introduction to Blockchain Technology
Niuversity
 
PPTX
Blockchain - HyperLedger Fabric
Araf Karsh Hamid
 
PPTX
Intro to smart contract on blockchain en
Nicholas Lin
 
PDF
Ethereum
Shermin Voshmgir
 
PPTX
The Blockchain and the Future of Cybersecurity
Kevin Cedeño, CISM, CISA
 
PPTX
Blockchain use cases
Software Infrastructure
 
ODP
Hyperledger Fabric and Tools
Rihusoft
 
PPTX
A Secure Model of IoT Using Blockchain
Altoros
 
PDF
Hyperledger Fabric Technical Deep Dive 20190618
Arnaud Le Hors
 
PPTX
Blockchain+IOT
Matthew David
 
Blockchain Study(1) - What is Blockchain?
Fermat Jade
 
Write Smart Contracts with Truffle Framework
Shun Shiku
 
What is merkle tree
Celine George
 
Blockchain Fundamentals - Top Rated for Beginners
101 Blockchains
 
Blockchain Technology
Rashi Singh
 
An Introduction to Blockchain
NexThoughts Technologies
 
Hyperledger Fabric
Murughan Palaniachari
 
The Blockchain - The Technology behind Bitcoin
Jérôme Kehrli
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Gautam Anand
 
An Introduction to Blockchain Technology
Niuversity
 
Blockchain - HyperLedger Fabric
Araf Karsh Hamid
 
Intro to smart contract on blockchain en
Nicholas Lin
 
The Blockchain and the Future of Cybersecurity
Kevin Cedeño, CISM, CISA
 
Blockchain use cases
Software Infrastructure
 
Hyperledger Fabric and Tools
Rihusoft
 
A Secure Model of IoT Using Blockchain
Altoros
 
Hyperledger Fabric Technical Deep Dive 20190618
Arnaud Le Hors
 
Blockchain+IOT
Matthew David
 

Similar to What makes blockchain secure: Key Characteristics & Security Architecture (20)

PPTX
622640_AYUSH KATIYAR_Cyber-Security In Blockchain Technology.pptx
ayushkatiyar972194
 
PPTX
Blockchain Security
Munawar Hussain
 
PDF
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain
 
DOCX
Blockchain Assignment
Akanksha Verma
 
PDF
A Complete Analysis of Blockchain Development from Scratch.pdf
Abi john
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PPT
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
DOCX
technology
nomber8
 
PPTX
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
PPTX
Why Blockchain Development Services Are Essential for Startup Success
Intelisync
 
PDF
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
Webtrack Technologies
 
PDF
Impact Of Blockchain Development On Banking System
Richestsoft
 
PDF
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
PDF
BLOCKCHAIN DEVELOPMENT COMPANY
clarksofia1578
 
PPTX
What makes BlockChain secure.pptx
ManishDevkar1
 
PDF
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
PPTX
Blockchain Technology For Beginners made easy
AJPW4EVER
 
PPTX
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
PDF
Implementing the business logic as a decentralized Smart Contracts
Digital Currency Summit
 
622640_AYUSH KATIYAR_Cyber-Security In Blockchain Technology.pptx
ayushkatiyar972194
 
Blockchain Security
Munawar Hussain
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain
 
Blockchain Assignment
Akanksha Verma
 
A Complete Analysis of Blockchain Development from Scratch.pdf
Abi john
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
technology
nomber8
 
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
Why Blockchain Development Services Are Essential for Startup Success
Intelisync
 
Blockchain Technology | A Comprehensive Guide by Webtrack Technologies
Webtrack Technologies
 
Impact Of Blockchain Development On Banking System
Richestsoft
 
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
BLOCKCHAIN DEVELOPMENT COMPANY
clarksofia1578
 
What makes BlockChain secure.pptx
ManishDevkar1
 
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
Blockchain Technology For Beginners made easy
AJPW4EVER
 
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
Implementing the business logic as a decentralized Smart Contracts
Digital Currency Summit
 
Ad

More from EC-Council (20)

PPTX
Skills that make network security training easy
EC-Council
 
PPTX
Can Cloud Solutions Transform Network Security
EC-Council
 
PPTX
6 Most Popular Threat Modeling Methodologies
EC-Council
 
PPTX
Journey from CCNA to Certified Network Defender v2
EC-Council
 
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
PPTX
Red Team vs. Blue Team
EC-Council
 
PPTX
Types of Malware (CEH v11)
EC-Council
 
PDF
Why Threat Intelligence Is a Must for Every Organization?
EC-Council
 
PDF
Why Digital Forensics as a Career?
EC-Council
 
PPTX
Cryptography in Blockchain
EC-Council
 
PPTX
A Brief Introduction to Penetration Testing
EC-Council
 
PPTX
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
PPTX
Pasta Threat Modeling
EC-Council
 
PPTX
Blockchain: Fundamentals & Opportunities​
EC-Council
 
PPTX
Cybersecurity Audit
EC-Council
 
PPTX
Third Party Risk Management
EC-Council
 
PPTX
Types of malware threats
EC-Council
 
PPTX
What's new in​ CEHv11?
EC-Council
 
PPTX
Business Continuity & Disaster Recovery
EC-Council
 
PPTX
Threat Intelligence Data Collection & Acquisition
EC-Council
 
Skills that make network security training easy
EC-Council
 
Can Cloud Solutions Transform Network Security
EC-Council
 
6 Most Popular Threat Modeling Methodologies
EC-Council
 
Journey from CCNA to Certified Network Defender v2
EC-Council
 
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
Red Team vs. Blue Team
EC-Council
 
Types of Malware (CEH v11)
EC-Council
 
Why Threat Intelligence Is a Must for Every Organization?
EC-Council
 
Why Digital Forensics as a Career?
EC-Council
 
Cryptography in Blockchain
EC-Council
 
A Brief Introduction to Penetration Testing
EC-Council
 
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
Pasta Threat Modeling
EC-Council
 
Blockchain: Fundamentals & Opportunities​
EC-Council
 
Cybersecurity Audit
EC-Council
 
Third Party Risk Management
EC-Council
 
Types of malware threats
EC-Council
 
What's new in​ CEHv11?
EC-Council
 
Business Continuity & Disaster Recovery
EC-Council
 
Threat Intelligence Data Collection & Acquisition
EC-Council
 
Ad

Recently uploaded (20)

PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 

What makes blockchain secure: Key Characteristics & Security Architecture

  • 1. What Makes Blockchain Secure Key Characteristics & Security Architecture Copyright EC-Council 2020. All Rights Reserved.​
  • 2. 3 Core Strategies Cryptography Decentralisation Consensus Blockchain solutions are specially crafted to be tamper-proof and are highly secure
  • 3. Key Characteristics of Blockchain Security​ • Blockchain is undeniably a measure that ensures security. It has become a disruptive technology due to its ability to centralize, incentivize, digitize, and secure the transactions’ validation. The records are protected through cryptography decentralization to ensure the fool proof blockchain security of the blocks. • Many sectors are evaluating blockchain Technology for detecting the strategic differentiation to leverage their business potential. Blockchain has the potential to simplify business processes and give them access to enhanced performance and security. • Every transaction in this technology that gets recorded and stored is not directly labelled as a blockchain.
  • 4. 1. Distributed Distributed blockchain technology evenly distributes the processing among all business peers, developing a shared infrastructure within the business system. Participants can independently validate the details without any centralized authority.
  • 5. 2. Immutable In this, all the blockchain transactions in the blockchain-based technology are immutable. Even the code encryption is done for the transactions, effectively covering the participants’ date, time, and information.
  • 6. 3. Consensus-Based The transactions in blockchain technology are executed only when the parties present on the network anonymously approve the same. One may even choose to alter the consensus- based regulations to match the circumstances.
  • 7. 4. Digital Signature This blockchain technology streamlines the exchange of translational values with unique digital signatures that depend on public keys. In blockchain technology, private key codes are known only to the key owners to develop ownership proof. It is a critical feature that avoids any fraud in blockchain record management.
  • 8. 5. Persistent Persistent blockchain technology invalid transaction detected by the consensus-based system. It isn’t easy to roll back the transactions once they are integrated into the blockchain ledger. Cryptographically, blockchain blocks are created and sealed inside the chain, making it difficult for the hackers to edit or delete already developed blocks and put them on the network.
  • 9. Security Architecture in the Blockchain Technology • The blockchain records are protected through cryptography, where network users have their own private and secure keys. • This key is assigned directly to the transaction keys, and it acts as a personalized digital signature. Blockchain safeguards and prevents any malicious attack and secures the data of the company by encrypting it. • This technology enables enterprises to separate their responsibilities and roles. It also helps them to protect confidential information without compromising access to any privileged user. • Blockchain is empowered at many layers for developing any enterprise application.
  • 10. Layers of Security Architecture​ User access layer Presentation layer Identity and access management layer Application layer Network layer Infrastructure layer
  • 11. Blockchain Security Architecture PC Laptop Smart Phone Tablet Terminal User Sessions Laptop Smart Phone Tablet Terminal Enterprise User Identity User Access Controls Certificates Smart Contracts Blockchain Protocol Consensus Algorithms Denial of Service Data in Motion SSL, TLS Audit Trail Data Monitoring User & Activity Monitoring User Access Presentation Layer Identity and Access Management Application/ Data Layer Network Layer Infrastructure Layer
  • 12. Blockchain technology is specially designed to pay off in the long run. Blockchain has irreversible and highly encrypted data blocks that allow us to fight against any fraudulent conduct. Conclusion
  • 13. Thanks for Watching! Want to learn blockchain? Join the next batch of Blockchain Training at EC-Council