Hands-on cybersecurity with blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deplo...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England ; Mumbai :
Packt
2018.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630613806719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Cyber Threat Landscape and Security Challenges
- Current threat landscape
- Ransomware
- The monetization of hacking
- WannaCry
- NotPetya
- SimpleLocker
- TeslaCrypt
- CryptoLocker
- PC Cyborg
- Distributed denial-of-service (DDoS) attacks
- From script kiddies to geopolitical
- Ease of launching a DDoS attack
- Top targeted countries
- Insider threats
- Some more ways to define insider threats
- Insider threat profile
- Data breaches
- Notable recent data breaches
- Impact of data breaches
- Advanced persistence threat (APT)
- What makes APTs so different?
- Defender perspectives
- Governments
- The United States (US)
- The United Kingdom (UK)
- Europe
- India
- Corporate
- Endpoint detection and response (EDR)
- Deception technology
- Cyber threat intelligence (CTI)
- Live attack execution
- Emerging security challenges
- Summary
- Questions
- Further reading
- Chapter 2: Security Must Evolve
- The security ecosystem
- The zero-trust approach
- The assume breach approach
- Evolution at the foundation layer
- Summary
- Questions
- Further reading
- Chapter 3: Introducing Blockchain and Ethereum
- What is blockchain?
- A brief history
- Fundamentals of the blockchain
- Who is using blockchain and how?
- Internet versus blockchain
- IP packet versus block
- Web app versus dApp
- How blockchain works
- The building blocks of blockchain
- Block
- Cryptography - digital signature and hashing algorithm
- Consensus - the core of blockchain
- Ethereum
- History
- What is Ethereum?
- Smart contract
- EVM
- Gas
- dApp
- Private versus public blockchain
- Public blockchain
- Private blockchain
- Business adaptation
- Summary
- Questions
- Further reading.
- Chapter 4: Hyperledger - Blockchain for Businesses
- Technical requirements
- Hyperledger overview
- Blockchain-as-a-service (BaaS)
- Program goal
- Architecture and core components
- Hyperledger Fabric model
- Hyperledeger Fabric core components
- Workings of Hyperledger and transaction processing
- Bitcoin versus Ethereum versus Hyperledger
- Hyperledger Fabric capabilities
- Lab
- Tuna application
- Summary
- Questions
- Chapter 5: Blockchain on the CIA Security Triad
- What is the CIA security triad?
- Confidentiality
- Integrity
- Availability
- Understanding blockchain on confidentiality
- Confidentiality in the existing model
- Businesses, blockchain, and confidentiality
- Achieving confidentiality with Hyperledger Fabric
- Blockchain on integrity
- Integrity in the current blockchain network
- Block arrangement and immutability
- Achieving integrity with Hyperledger
- Verifying chain integrity
- Understanding blockchain on availability
- Availability in the current blockchain network
- No single point of failure
- Business and availability
- Summary
- Questions
- Further reading
- Chapter 6: Deploying PKI-Based Identity with Blockchain
- PKI
- PKI in a nutshell
- The evolution of PKI
- Components
- Asymmetric key encryption
- Certificate
- Certificate authority (CA)
- Registration authority (RA)
- Certificate repository (CR)
- Architecture
- Certificate life cycle
- Key management
- Challenges of the existing PKI model
- How can blockchain help?
- Decentralized infrastructure
- Deployment method
- Requirements
- Lab
- Testing
- Summary
- Questions
- Further reading
- Chapter 7: Two-Factor Authentication with Blockchain
- What is 2FA?
- Evolution of user authentication
- Why 2FA?
- How does it work?
- Challenges
- Blockchain for 2FA
- How can blockchain transform 2FA?.
- Solution architecture
- Lab
- Components
- Preparation
- Installing Node.js
- Turning up Ethereum
- Turning up the smart contract
- Testing and verification
- Summary
- Questions
- Further reading
- Chapter 8: Blockchain-Based DNS Security Platform
- DNS
- Understanding DNS components
- Namespace
- Name servers
- Resolver
- DNS structure and hierarchy
- Root name server
- Current TLD structure
- Registries, registrars, and registrants
- DNS records
- DNS topology for large enterprises
- Architecture
- Challenges with current DNS
- DNS spoofing
- Blockchain-based DNS solution
- X.509 PKI replacement
- MITM-proof DNS infrastructure
- Lab on Ethereum-based secure DNS infrastructure
- Lab preparation
- Namecoin blockchain installation
- Installing PowerDNS
- Installing DNSChain
- Summary
- Questions
- Further reading
- Chapter 9: Deploying Blockchain-Based DDoS Protection
- DDoS attacks
- What is a DDoS attack?
- How does it work?
- Building up the botnet
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and control (C2)
- Action on objectives
- Types of DDoS attacks
- Attacks targeting network resources
- User datagram protocol (UDP) flood
- ICMP flood
- Internet Group Management Protocol (IGMP) flood
- Amplification attacks
- Attacks targeting server resources
- TCP SYN Flood
- TCP RST attack
- Secure sockets layer (SSL)-based attack
- Encrypted HTTP attacks
- Attacks targeting application resources
- DNS flooding
- Regular expression DoS attacks
- Hash collision DoS attacks
- Challenges with current DDoS solutions
- How can blockchain transform DDoS protection?
- Lab
- Summary
- Questions
- Further reading
- Chapter 10: Facts about Blockchain and Cyber Security
- Decision path for blockchain
- When should you use blockchain?.
- When should you not use blockchain?
- Leader's checklist
- Challenges with blockchain
- The future of cybersecurity with blockchain
- Summary
- Questions
- Further reading
- Assessment
- Other Books You May Enjoy
- Index.