Hands-on cybersecurity with blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deplo...

Descripción completa

Detalles Bibliográficos
Otros Autores: Gupta, Rajneesh, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England ; Mumbai : Packt 2018.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630613806719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • About Packt
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Cyber Threat Landscape and Security Challenges
  • Current threat landscape
  • Ransomware
  • The monetization of hacking
  • WannaCry
  • NotPetya
  • SimpleLocker
  • TeslaCrypt
  • CryptoLocker
  • PC Cyborg
  • Distributed denial-of-service (DDoS) attacks
  • From script kiddies to geopolitical
  • Ease of launching a DDoS attack
  • Top targeted countries
  • Insider threats
  • Some more ways to define insider threats
  • Insider threat profile
  • Data breaches
  • Notable recent data breaches
  • Impact of data breaches
  • Advanced persistence threat (APT)
  • What makes APTs so different?
  • Defender perspectives
  • Governments
  • The United States (US)
  • The United Kingdom (UK)
  • Europe
  • India
  • Corporate
  • Endpoint detection and response (EDR)
  • Deception technology
  • Cyber threat intelligence (CTI)
  • Live attack execution
  • Emerging security challenges
  • Summary
  • Questions
  • Further reading
  • Chapter 2: Security Must Evolve
  • The security ecosystem
  • The zero-trust approach
  • The assume breach approach
  • Evolution at the foundation layer
  • Summary
  • Questions
  • Further reading
  • Chapter 3: Introducing Blockchain and Ethereum
  • What is blockchain?
  • A brief history
  • Fundamentals of the blockchain
  • Who is using blockchain and how?
  • Internet versus blockchain
  • IP packet versus block
  • Web app versus dApp
  • How blockchain works
  • The building blocks of blockchain
  • Block
  • Cryptography - digital signature and hashing algorithm
  • Consensus - the core of blockchain
  • Ethereum
  • History
  • What is Ethereum?
  • Smart contract
  • EVM
  • Gas
  • dApp
  • Private versus public blockchain
  • Public blockchain
  • Private blockchain
  • Business adaptation
  • Summary
  • Questions
  • Further reading.
  • Chapter 4: Hyperledger - Blockchain for Businesses
  • Technical requirements
  • Hyperledger overview
  • Blockchain-as-a-service (BaaS)
  • Program goal
  • Architecture and core components
  • Hyperledger Fabric model
  • Hyperledeger Fabric core components
  • Workings of Hyperledger and transaction processing
  • Bitcoin versus Ethereum versus Hyperledger
  • Hyperledger Fabric capabilities
  • Lab
  • Tuna application
  • Summary
  • Questions
  • Chapter 5: Blockchain on the CIA Security Triad
  • What is the CIA security triad?
  • Confidentiality
  • Integrity
  • Availability
  • Understanding blockchain on confidentiality
  • Confidentiality in the existing model
  • Businesses, blockchain, and confidentiality
  • Achieving confidentiality with Hyperledger Fabric
  • Blockchain on integrity
  • Integrity in the current blockchain network
  • Block arrangement and immutability
  • Achieving integrity with Hyperledger
  • Verifying chain integrity
  • Understanding blockchain on availability
  • Availability in the current blockchain network
  • No single point of failure
  • Business and availability
  • Summary
  • Questions
  • Further reading
  • Chapter 6: Deploying PKI-Based Identity with Blockchain
  • PKI
  • PKI in a nutshell
  • The evolution of PKI
  • Components
  • Asymmetric key encryption
  • Certificate
  • Certificate authority (CA)
  • Registration authority (RA)
  • Certificate repository (CR)
  • Architecture
  • Certificate life cycle
  • Key management
  • Challenges of the existing PKI model
  • How can blockchain help?
  • Decentralized infrastructure
  • Deployment method
  • Requirements
  • Lab
  • Testing
  • Summary
  • Questions
  • Further reading
  • Chapter 7: Two-Factor Authentication with Blockchain
  • What is 2FA?
  • Evolution of user authentication
  • Why 2FA?
  • How does it work?
  • Challenges
  • Blockchain for 2FA
  • How can blockchain transform 2FA?.
  • Solution architecture
  • Lab
  • Components
  • Preparation
  • Installing Node.js
  • Turning up Ethereum
  • Turning up the smart contract
  • Testing and verification
  • Summary
  • Questions
  • Further reading
  • Chapter 8: Blockchain-Based DNS Security Platform
  • DNS
  • Understanding DNS components
  • Namespace
  • Name servers
  • Resolver
  • DNS structure and hierarchy
  • Root name server
  • Current TLD structure
  • Registries, registrars, and registrants
  • DNS records
  • DNS topology for large enterprises
  • Architecture
  • Challenges with current DNS
  • DNS spoofing
  • Blockchain-based DNS solution
  • X.509 PKI replacement
  • MITM-proof DNS infrastructure
  • Lab on Ethereum-based secure DNS infrastructure
  • Lab preparation
  • Namecoin blockchain installation
  • Installing PowerDNS
  • Installing DNSChain
  • Summary
  • Questions
  • Further reading
  • Chapter 9: Deploying Blockchain-Based DDoS Protection
  • DDoS attacks
  • What is a DDoS attack?
  • How does it work?
  • Building up the botnet
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and control (C2)
  • Action on objectives
  • Types of DDoS attacks
  • Attacks targeting network resources
  • User datagram protocol (UDP) flood
  • ICMP flood
  • Internet Group Management Protocol (IGMP) flood
  • Amplification attacks
  • Attacks targeting server resources
  • TCP SYN Flood
  • TCP RST attack
  • Secure sockets layer (SSL)-based attack
  • Encrypted HTTP attacks
  • Attacks targeting application resources
  • DNS flooding
  • Regular expression DoS attacks
  • Hash collision DoS attacks
  • Challenges with current DDoS solutions
  • How can blockchain transform DDoS protection?
  • Lab
  • Summary
  • Questions
  • Further reading
  • Chapter 10: Facts about Blockchain and Cyber Security
  • Decision path for blockchain
  • When should you use blockchain?.
  • When should you not use blockchain?
  • Leader's checklist
  • Challenges with blockchain
  • The future of cybersecurity with blockchain
  • Summary
  • Questions
  • Further reading
  • Assessment
  • Other Books You May Enjoy
  • Index.