Hands-On Cybersecurity with Blockchain
Rajneesh Gupta更新时间:2021-06-18 19:19:07
最新章节:Leave a review - let other readers know what you think封面
版权信息
About Packt
Why subscribe?
PacktPub.com
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Disclaimer
Cyber Threat Landscape and Security Challenges
Current threat landscape
Ransomware
The monetization of hacking
WannaCry
NotPetya
SimpleLocker
TeslaCrypt
CryptoLocker
PC Cyborg
Distributed denial-of-service (DDoS) attacks
From script kiddies to geopolitical
Ease of launching a DDoS attack
Top targeted countries
Insider threats
Some more ways to define insider threats
Insider threat profile
Data breaches
Notable recent data breaches
Impact of data breaches
Advanced persistence threat (APT)
What makes APTs so different?
Defender perspectives
Governments
The United States (US)
The United Kingdom (UK)
Europe
India
Corporate
Endpoint detection and response (EDR)
Deception technology
Cyber threat intelligence (CTI)
Live attack execution
Emerging security challenges
Summary
Questions
Further reading
Security Must Evolve
The security ecosystem
The zero-trust approach
The assume breach approach
Evolution at the foundation layer
Summary
Questions
Further reading
Introducing Blockchain and Ethereum
What is blockchain?
A brief history
Fundamentals of the blockchain
Who is using blockchain and how?
Internet versus blockchain
IP packet versus block
Web app versus dApp
How blockchain works
The building blocks of blockchain
Block
Cryptography – digital signature and hashing algorithm
Consensus – the core of blockchain
Ethereum
History
What is Ethereum?
Smart contract
EVM
Gas
dApp
Private versus public blockchain
Public blockchain
Private blockchain
Business adaptation
Summary
Questions
Further reading
Hyperledger – Blockchain for Businesses
Technical requirements
Hyperledger overview
Blockchain-as-a-service (BaaS)
Program goal
Architecture and core components
Hyperledger Fabric model
Hyperledeger Fabric core components
Workings of Hyperledger and transaction processing
Bitcoin versus Ethereum versus Hyperledger
Hyperledger Fabric capabilities
Lab
Tuna application
Summary
Questions
Blockchain on the CIA Security Triad
What is the CIA security triad?
Confidentiality
Integrity
Availability
Understanding blockchain on confidentiality
Confidentiality in the existing model
Businesses blockchain and confidentiality
Achieving confidentiality with Hyperledger Fabric
Blockchain on integrity
Integrity in the current blockchain network
Block arrangement and immutability
Achieving integrity with Hyperledger
Verifying chain integrity
Understanding blockchain on availability
Availability in the current blockchain network
No single point of failure
Business and availability
Summary
Questions
Further reading
Deploying PKI-Based Identity with Blockchain
PKI
PKI in a nutshell
The evolution of PKI
Components
Asymmetric key encryption
Certificate
Certificate authority (CA)
Registration authority (RA)
Certificate repository (CR)
Architecture
Certificate life cycle
Key management
Challenges of the existing PKI model
How can blockchain help?
Decentralized infrastructure
Deployment method
Requirements
Lab
Testing
Summary
Questions
Further reading
Two-Factor Authentication with Blockchain
What is 2FA?
Evolution of user authentication
Why 2FA?
How does it work?
Challenges
Blockchain for 2FA
How can blockchain transform 2FA?
Solution architecture
Lab
Components
Preparation
Installing Node.js
Turning up Ethereum
Turning up the smart contract
Testing and verification
Summary
Questions
Further reading
Blockchain-Based DNS Security Platform
DNS
Understanding DNS components
Namespace
Name servers
Resolver
DNS structure and hierarchy
Root name server
Current TLD structure
Registries registrars and registrants
DNS records
DNS topology for large enterprises
Architecture
Challenges with current DNS
DNS spoofing
Blockchain-based DNS solution
X.509 PKI replacement
MITM-proof DNS infrastructure
Lab on Ethereum-based secure DNS infrastructure
Lab preparation
Namecoin blockchain installation
Installing PowerDNS
Installing DNSChain
Summary
Questions
Further reading
Deploying Blockchain-Based DDoS Protection
DDoS attacks
What is a DDoS attack?
How does it work?
Building up the botnet
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control (C2)
Action on objectives
Types of DDoS attacks
Attacks targeting network resources
User datagram protocol (UDP) flood
ICMP flood
Internet Group Management Protocol (IGMP) flood
Amplification attacks
Attacks targeting server resources
TCP SYN Flood
TCP RST attack
Secure sockets layer (SSL)-based attack
Encrypted HTTP attacks
Attacks targeting application resources
DNS flooding
Regular expression DoS attacks
Hash collision DoS attacks
Challenges with current DDoS solutions
How can blockchain transform DDoS protection?
Lab
Summary
Questions
Further reading
Facts about Blockchain and Cyber Security
Decision path for blockchain
When should you use blockchain?
When should you not use blockchain?
Leader's checklist
Challenges with blockchain
The future of cybersecurity with blockchain
Summary
Questions
Further reading
Assessment
Chapter 1: Cyber Threat Landscape and Security Challenges
Chapter 2: Security Must Evolve
Chapter 3: Introducing Blockchain and Ethereum
Chapter 4: Hyperledger – Blockchain for Businesses
Chapter 5: Blockchain on the CIA Security Triad
Chapter 6: Deploying PKI-Based Identity with Blockchain
Chapter 7: Two-Factor Authentication with Blockchain
Chapter 8: Blockchain-Based DNS Security Platform
Chapter 9: Deploying Blockchain-Based DDoS Protection
Chapter 10: Facts about Blockchain and Cyber Security
Other Books You May Enjoy
Leave a review - let other readers know what you think
更新时间:2021-06-18 19:19:07