Evolution at the foundation layer
We had a leaky boat structure, and, in spite of fixing it, we are simply making this faster and smarter boat load more and more unnecessary resources. It's time to try changing the entire boat structure and see how well we can thrive.
The entirety of cyber security is for protecting computer networks that run on the TCP/IP model and use client-server database architecture. The authority to modify data remains with the centralized server, which authenticates each client before allowing them to access the database. As there is only one server authority for regulation and maintenance, if that is compromised, the entire data can be altered, exfiltrated, or even deleted. The majority of data-breach incidents are basically an effect and risk of having a centralized server database on the cloud. As we go on to the next chapter, you will learn how to address this fundamental and critical gap with one of the most remarkable technology innovations named blockchain...