Blockchain As A Security Brick For Software Applications - Owasp

1y ago
8 Views
1 Downloads
3.74 MB
19 Pages
Last View : 7d ago
Last Download : 3m ago
Upload by : Ryan Jay
Transcription

BLOCKCHAIN AS A SECURITYBRICK FOR SOFTWAREAPPLICATIONSBLOCKCHAIN [FOR] SECURITY WEBINAR – OWASP - 5/12/2020

WHO’S WHO Head of Life-Insurance & Post-Trade Software Development 18 years experience : System Engineer, DBA , DATA Architect ,Software Dev Manager & Blockchain Enthusiast since 2014 My N/SBELHADJ/12/5/20202

AGENDA Blockchain Definition (Technical/Conceptual)Blockchain or How to clone Physical transaction to Digital transactionDistributed Database vs Distributed LedgerBlockchain & Internet OF VALUEBlockchain Security DesignBlockchain Security for IOTICO Dapp 3

BLOCKCHAIN DEFINITION (TECHNICAL) Append-only Distributed Database (Ledger) shared between multiple nontrusting writers without the need for a Trusted Central Authority. The data integrity of the Ledger is guaranteed by a Distributed LHADJ/12/5/20204

BLOCKCHAIN SOLUTIONS3 BASIC COMPONENTS:1. A data model that captures the current state of the ledger.2. A language of transactions that changes the ledger state.3. A protocol used to build consensus among participantsaround which transactions will be accepted, and in what order,by the 0205

BLOCKCHAIN OR HOW TO CLONE PHYSICALTRANSACTION TO DIGITAL TRANSACTIONImenSamiImenSami Easily Verifiable. No need for a third-party to validate the transaction. He can even add to his account whenever he wants. Imen does not have the money anymore and Sami He can impose high commissionshas it in his hands. Instant transfer of the assetHTTPS://WWW.LINKEDIN.COM/IN/SBELHADJ/ What if the third trusted party duplicates the asset?What If his service is hacked : service unavailable(SPOF) The end user does not have the 12/5/2020means to check by6himself

BLOCKCHAIN OR HOW TO CLONE PHYSICALTRANSACTION TO DIGITAL TRANSACTIONBlockchain TechnologyTrusted third-partySamiDali Same Rules Consensus Algorithm Single source of TruthImenImen What if the third trusted party duplicates the asset? He can even add to his account whenever he wants. He can request high fees What If his service is hacked : service unavailable(SPOF) The end user does not have the means to check byhimselfHTTPS://WWW.LINKEDIN.COM/IN/SBELHADJ/Sami The Ledger is no longer owned by a single entity Validation and verification of the Ledger is no longer a monopoly Consensus rules guarantee the security of the Ledger12/5/2020 The end-user can even participate in maintainingthe Ledger 7(the purestversion of the BC) Actors are incentivized to act "ethically"

DISTRIBUTED DATABASE VS DISTRIBUTED LEDGERNodes of a distributed database trust eachother and collaborate with each other topresent a consistent, secure truth to the rest ofthe world.Paxos, Raft, Distributed DatabaseIt’s All About the TrustBoundary!!!PoW,PoS, HTTPS://WWW.LINKEDIN.COM/IN/SBELHADJ/Distributed Ledger (Blockchain)Nodes of a distributed ledger(Blockchain) can not trust each other and somust independently verify data they receive fromeach other and only share data they are happy to bebroadly shared.12/5/20208

BLOCKCHAIN DEFINITION (CONCEPTUAL)Blockchain is a paradigm shift in the way we approachdesigning economic systems involving multiple peers withdivergent interests ( zero-sum game) but find it profitable to bepart of the same system.The traits of such systems are : Decentralized , governed by rules but without rulers : Protocolsinstead of Platforms. Trust is derived from the network not from hierarchy (Trustless). Transactions are secured by 12/5/20209

BIG SHIFT IN BUSINESS MODELS DESIGNSBusiness models are increasingly based on the reduction of intermediariesPlatform EconomySharing EconomyP2P 0202010201510

BLOCKCHAIN & INTERNET OF VALUE Blockchain is the last Brick in the Internet protocol that allowed Internet to moveValue between 011

EMBEDDED SECURITY IN BLOCKCHAIN DESIGN Internet was designed without security as a priority Only aresilient network!! Blockchain protocol was designed with security EMBEDDED in itsCORE (BFT in practice, identification , encrypted transactions, ) Internet security was implemented at the Application protocol Level. Blockchain security is implemented at the low level protocol 2012

DAPPS SECURITY REQUIREMENTS Identification & Authentication Cryptographic identity Data Integrity Encrypted transactions coupled to CommonConsensus mechanism Data Confidentiality Zero-knowledge proof / Homomorphicencryption Data Ownership/Control Distribution of 13

BLOCKCHAIN SECURITY FOR IOT The Distributed character of IOT networks makes it a good candidate forBlockchain technology Blockchain, which is most familiar for bitcoin and Ethereum, offers anintriguing solution for IoT security. Blockchain contains strong protectionsagainst data tampering, locking access to Internet of Things devices, andallowing compromised devices in an IoT network to be shut 014

ICO DAPP 15

DApp reference 2/5/20201616

StepsStep 1 : Setting up the environmentStep 2 : Writing the Smart ContractsStep 3 : Compiling and deploying(migrating) the SmartContractsStep 4 : Testing the Smart ContractsStep 5 : Creating the Front-endStep 6: Using the 1717

Creating the /20201818

Step 6 : Interacting with the 1919

BLOCKCHAIN SECURITY FOR IOT The Distributed character of IOT networks makes it a good candidate for Blockchaintechnology Blockchain, which is most familiar for bitcoin and Ethereum, offers an intriguing solution for IoT security. Blockchain contains strong protections against data tampering, locking access to Internet of Things devices, and

Related Documents:

OLD BRICK ORIGINALS THIN BRICK VENEER Page 10 FAST ADHESIVE METHOD Step 1: Install the Cement Fiberboard Secure the fiberboard to your wall studs using 3/4” screws. Be sure to countersink the screws so the brick can bond properly to the board. File Size: 2MBPage Count: 12Explore furtherRecommended Application Guidelines for Adhered Thin Brick .www.interstatebrick.comThin Brick Veneerwww.gobrick.comDesigning & Detailing Adhered Veneer Systems . - BRICK-ITbrickit.comRecommended to you b

Thin Brick meet ASTM C1088 standard specification for Thin Veneer Brick Units made from clay or shale. In this specification, the term thin veneer brick shall be understood to mean clay masonry unit with a maximum thickness of 1-3/4". Grade Exterior Belden Brick manufactures thin brick to meet Grade Exterior with a weathering index of SW. Types

THE EMERGENCE OF CHINA'S STATE-BACKED BLOCKCHAIN PLATFORM JUNE 2021 Overview Introduction to Blockchain China's Communisty Party Prioritizes Blockchain p. 2 p. 8 p. 10 p. 11 China's State-backed Blockchain Ecosystem p. 13 The Potential Data Security Risks Associated with BSN p. 18 Permissioned vs. Permissionless Blockchain

Birmingham AL Architectural Works, LLP; Derck & Edson Associates, LLP HMF to Brick, Brick to Brick, Brick to Wood, Brick to Soffit, Stone to Stone, Louvers to Brick 890 NST New Margaret Elementary School Odenville AL Lathan Associates Achitects PC 890 NST The University of Alabama at Birmingham New Alumni Building

and many other brick applications. Use our Masonry Designer or Virtual Mason at www.beldenbrick.com to lay out brick patterns, compare colors and even change the mortar on brick walls. Along with our more than 200 distributors across the country plus Belden Brick regional sales managers and customer service personnel, The Belden Brick Com-

www.sheppardmullin.com Blockchain Games and Collectibles - Patents and Other Legal Issues March 2019 By: James G. Gatto 1. Blockchain Games and Collectibles Are on the Rise – The use of blockchain (or distributed ledger) technology for games (a.k.a blockchain ga

AWS Blockchain Templates helps you quickly create and deploy blockchain networks on AWS using different blockchain frameworks. Blockchain is a decentralized database technology that maintains a continually growing set of transactions and smart contracts hardened against tampering and revision

or a small group of countries, we explore possible drivers behind the decline in income inequality in Latin America as a whole. To undertake this task, we utilize an array of methodologies—including correlation and econometric techniques. To start, we look at simple correlations between changes in policy variables and changes in income inequality