Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Hands-On Cybersecurity with Blockchain

You're reading from   Hands-On Cybersecurity with Blockchain Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Arrow left icon
Product type Paperback
Published in Jun 2018
Publisher
ISBN-13 9781788990189
Length 236 pages
Edition 1st Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Rajneesh Gupta Rajneesh Gupta
Author Profile Icon Rajneesh Gupta
Rajneesh Gupta
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Title Page
About Packt
Contributors
Preface
1. Cyber Threat Landscape and Security Challenges FREE CHAPTER 2. Security Must Evolve 3. Introducing Blockchain and Ethereum 4. Hyperledger – Blockchain for Businesses 5. Blockchain on the CIA Security Triad 6. Deploying PKI-Based Identity with Blockchain 7. Two-Factor Authentication with Blockchain 8. Blockchain-Based DNS Security Platform 9. Deploying Blockchain-Based DDoS Protection 10. Facts about Blockchain and Cyber Security 1. Assessment 2. Other Books You May Enjoy Index

The building blocks of blockchain


Blockchain technology is built over a group of existing technologies that have been widely used across the industry. Let's go through each component of blockchain that makes the entire system distributed, immutable, and reliable in nature.

Block

A distributed ledger is stored in a database and updated by each participant in the blockchain network. A ledger is represented in a series of units called blocks. To understand the block, lets start with the under traditional data model and then jump to blockchain network to understand how the block is getting chained together.

Let's first understand the regular way of information exchange over the internet. In the world of the TCP/IP stack, information is transferred through a client/server model where the client can store and modify the data on a centralized server. However, the control of the database remains with a designated administrator. If the security of the administrator is compromised, the entire database...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images