Blockchain and Cyber Defense Strategies in new genre times

anupriti 412 views 146 slides Jun 30, 2024
Slide 1
Slide 1 of 146
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146

About This Presentation

Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance ...


Slide Content

BLOCKCHAIN
Exploring
By: Dr AnupamTiwari

#GPCSSI202411thBatchofGurugram
PoliceCyberSecurityInternship2024

CYBER SECURITY

Secure Network Configuration
Security audits and assessments

Intrusion Detection and Prevention Systems (IDPS)
Phishing Prevention
Secure Network Configuration
Data Encryption
Backup and Disaster Recovery
Endpoint protection
Incident response planning
Security policies and procedures
Security audits and assessments

Intrusion Detection and Prevention Systems (IDPS)
Antivirus/Antimalware Software
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Security Monitoring and Incident Response
Backup and Disaster Recovery
Endpoint protection
Network monitoring and loggingIncident response planning
Secure virtualization practices
Security policies and procedures SIEM
Security audits and assessments

Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Endpoint protection
Physical security controls
Network monitoring and loggingIncident response planning
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Security audits and assessments

Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and loggingIncident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments

Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and loggingIncident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments

CYBER SECURITY

ONE HUNDRED PERCENT
PROTECTION DOES NOT EXIST

MAKE THE PROBLEM
HARDER FOR CRIMINALS
TO BREAK

FOR THE
UNversed
WHAT
IS
An Overall View……

BLOCKwith
some DATA

BLOCKwith
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size

HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA

HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA

HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA

HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA

SHA-256 (Hash algorithm)
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
There are 100’s of
algorithms & this is one
TYPE
BLOCKwith
some DATA

SHA-256 (Hash algorithm)
6bcec30f359e597986bcdc075eed3e339a3a1
8673ec4624425d75247eacce9f5
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA

Text input : TALK ON 27 JUN 2024
HASH

HASH
Let this be a sample
TEXT data and be
applied HASH upon
Text input : TALK ON 27 JUN 2024

Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output

Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output

Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
WATCH HERE

Text input : TALK ON 27 JUn2024
eb23df9940ebe8ad1ad9ef271e7de5923e7b45
93199ce699f82c9e4986df737b
HASH
WATCH HERE

BLOCKwith
some DATA

1
BLOCKwith
some DATA

1 2

1 2 3

1 2 3 4

1 2 3 4 5

1 2 3 4 5
6

1 2 3 4 5
7 6

1 2 3 4 5
8 7 6

1 2 3 4 5
9 8 7 6

1 2 3 4 5
10 9 8 7 6

1 2 3 4 5
10 9 8 7 6
11

1 2 3 4 5
10 9 8 7 6
11 12

1 2 3 4 5
10 9 8 7 6
11 12 13

1 2 3 4 5
10 9 8 7 6
11 12 13 14

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 1
embedded in Block 2

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 2
embedded in Block 3

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 3
embedded in Block 4

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
So, we get a chain of blocks …

1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
….Mathematically connected
So, we get a chain of blocks …

1 2 3 4 5
11 12 13 14 15
….Mathematically connected
So, we get a chain of blocks …

Trust|ThirdpartyNegation|HashCash|PublicKeys|PrivateKeys|y2=x3+7|RIPEMD-160|SHA-256|
FiniteFields|Secp256k1standard|DistributedLedger|03Jan2009|SatoshiNakamoto|ASIC|Mining|
Proofofwork|Consensus|ECDSA|PrimeNumbers|Immutability|Cryptography|Transactions|Wallets
|Walletfile|dataextraction|Linuxsystem|BitcoinCore|BitcoinScripts|Bloomfilters|BIP0037Bloom
filters|GettingMerkleblocks|gettingtransactionsofinterest|Usingmultiplehashfunctions|Gossip
Protocol|GPU|FPGA|Thetransactionlifecycle|Thetransactiondatastructures|Typesofscripts|
Coinbasetransactions|Transactionvalidations|Transactionbugs|Difficultyadjustmentandretargeting
algorithms|KimotoGravityWellDifficultyadjustmentandretargetingalgorithms|KimotoGravityWell|
DarkGravityWave|Bitcoinlimitations|Privacyandanonymity|ExtendedprotocolsontopofBitcoin
|Coloredcoins|Hashingalgorithms|Difficultyadjustmentalgorithms|Inter-blocktime|Blockrewards|
Rewardhalvingrate|Blocksizeandtransactionsize|DarkGravityWave|DigiShield|Difficultyadjustment
algorithms|Inter-blocktime|Blockrewards|Rewardhalvingrate|Blocksizeandtransactionsize|
BitcoinDevelopmentEnvironment|CompilingBitcoinCorefromtheSourceCode|SelectingaBitcoinCore
Release|ConfiguringtheBitcoinCoreBuild|BuildingtheBitcoinCoreExecutables|RunningaBitcoinCore
Node|RunningBitcoinCorefortheFirstTime|ConfiguringtheBitcoinCoreNode|BitcoinCore
ApplicationProgrammingInterface(API)|GettingInformationontheBitcoinCoreClientStatus|Exploring
andDecodingTransactions|ExploringBlocks|UsingBitcoinCore’sProgrammaticInterface|Advanced
TransactionsandScripting|Multisignature|Pay-to-Script-Hash(P2SH)|P2SHAddresses|BenefitsofP2SH
|RedeemScriptandValidation|DataRecordingOutput(RETURN)|Timelocks|TransactionLocktime
(nLocktime)|CheckLockTimeVerify(CLTV)|RelativeTimelocks|RelativeTimelockswithnSequence|
RelativeTimelockswithCSV|Median-Time-Past|TimelockDefenseAgainstFeeSniping|ScriptswithFlow
Control(ConditionalClauses)|ConditionalClauseswithVERIFYOpcodes|UsingFlowControlinScripts|

WHAT DOES
BLOCKCHAIN
TECHNOLOGY
ACTUALLY ACHIEVE?

BLOCKCHAIN

COMMON “GLOBAL”
BLOCKCHAINPLATFORM

BLOCKCHAIN 1
BLOCKCHAIN 2
BLOCKCHAIN 3
INTER
OPERABILITY

BLOCKCHAIN

WHAT ARE WE DOING ?

https://avasant.com/report/blockchain-adoption-indian-states/

KEEP IN MIND

OPERATINGSYSTEMS

CRYPTOGRAPHY STANDARDS

ENCRYPTIONSTANDARDS

AADHARON ANDROID & iPHONE

UPI ON ANDROID & iPHONE

AI MODELS

Regional versions of LLMs?

FRONTIER: Speed of 1685
PETAFLOPS
AIRAWAT: Speed of13.17
PETAFLOPS
SUPERCOMPUTERs

DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR
WE ARE HAPPY BEING USERS?
AR –VR –ER -MR

•Theoreticallyreducedriskofbuilt-infunctionalitiesthatcouldgatheruserdataforforeignentities.
•Alignmentwithgovernmentregulationsordataresidencyrequirementsfordatasovereignty.
BROWSERs

STORAGE SSD/HDD/RAMs
•HardwareBackdoors:Theoreticalriskthatforeigngovernmentscouldintroducehardware
backdoorsduringproduction
•SupplyChainVulnerabilities:Supplychainforforeign-madeHDDscanbecomplex,makingit
hardertotrackandpotentiallyintroducingvulnerabilitieswheremaliciousactorscouldtamperwiththe
drives.

•Enterprise routers/switches: Smaller process (14nm-7nm) for better
performance and lower power consumption.
•Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES

ANTIVIRUS-UTMs-FIREWALLS

ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during
manufacturing

SEMI CONDUCTORS & PROCESSORS

SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nmchip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?

15 to 25 countries

MAIN FRAME OS
•Unisys
•IBM
•Fujitso
•HP
•BULL
•Vendor Lock-in
•Limited Customization
•Potential Backdoors

ZERO CLICK
THREATS

AD TECH

FMRI-AI

Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Source: https://www.submarinecablemap.com/

NTP

WELCOME QUANTUM & POST
QUANTUM TIMES!!!

ICANN

●GenericNamesSupportingOrganization(GNSO)-TheGNSOisresponsiblefordevelopingand
recommendingtotheICANNBoardglobalpoliciesrelatedtogenerictop-leveldomains(gTLDs).TheGNSO
includesstakeholdergroupsrepresentingbusiness,intellectualpropertyinterests,non-commercialusers,and
Internetserviceproviders.
●CountryCodeNamesSupportingOrganization(ccNSO)-TheccNSOisresponsiblefordevelopingpolicies
relatedtocountry-codetop-leveldomains(ccTLDs)andrepresentingtheinterestsofccTLDoperatorsinICANN's
decision-makingprocesses.
●AddressSupportingOrganization(ASO)-TheASOisresponsibleforadvisingtheICANNBoardonglobalIP
addressallocationpoliciesandrepresentingtheinterestsoftheRegionalInternetRegistries(RIRs).
●At-LargeAdvisoryCommittee(ALAC)-TheALACisresponsibleforrepresentingtheinterestsofindividual
InternetusersinICANN'sdecision-makingprocesses.TheALACiscomposedofmemberswhoareappointedby
regionalAt-Largeorganizations.
●GovernmentalAdvisoryCommittee(GAC)-TheGACprovidesadvicetotheICANNBoardonissuesrelated
topublicpolicyandgovernmentconcerns.
●RootServerSystemAdvisoryCommittee(RSSAC)-TheRSSACadvisestheICANNBoardonmattersrelated
totheoperation,administration,security,andintegrityoftherootserversystem,whichisacriticalpartofthe
Internet'sinfrastructure.
●SecurityandStabilityAdvisoryCommittee(SSAC)-TheSSACadvisestheICANNcommunityandBoardon
issuesrelatedtothesecurityandstabilityoftheInternet'snamingandaddressallocationsystems.
ICANN

CLOUD HARDWARE LEADING COMPANIES
•Dell Technologies
•Hewlett Packard Enterprise (HPE)
•Lenovo
•Cisco
•Inspur(Chinese company)
•Huawei(Chinese company)
•Gigabyte
•Supermicro
•NetApp
•NVIDIA
CLOUD SOFTWARE/APIs LEADING COMPANIES
•Microsoft Azure
•Amazon Web Services
•Google Cloud Platform
•VMware (Software)
•Red Hat (Software)
•OpenStack
•CloudBees
•Chef
•Puppet
•Ansible
CLOUD INFRASTRUCTURE
INSERT PIC ZERO DAY-SIDE CHANNEL ETC

NATIONAL E-MAIL??

•Snapdeal
•Swiggy
•Udaan
•Zomato
•Dream 11
•Flipkart
•Hike
•MakeMyTrip
•Byju's
•Ola
•Oyo
•PaytmMall
•Paytm.com
•PolicyBazaar
•Quikr
•Rivigo
•Snapdeal
•BigBasket
Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted-
india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments .
18Unicorncompanies
inIndiahaveover
$3,500 millionof
Chineseinvestments

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
CRYPTOGRAPHY
USA -NIST
RUSSIA -GOST
(GosudarstvennyĭStandart)
China -SCA (State Cryptography
Administration)
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW

GFWIN CHINA

RuNET2020

•Laplace Mechanism
•Gaussian Mechanism
•Randomized Response
•Smoothing
•Clipping
•Quantization
•Privacy-Preserving Data
Synthesis
Differential Privacy
Data Sovereignty + Differential Privacy = Stronger
Protection

•FedAvg(Federated Averaging)
•FedSGD(Federated Stochastic
Gradient Descent)
•FedProx(Federated Proximal)
•Differential Private Federated
Learning
•Secure Aggregation Techniques
Federated Learning

Homomorphic
Encryption

Retrieval
Augmented
Generation

PALAPA RING INDONESIA

Contact me at [email protected]
[https://orcid.org/0000-0002-9097-2246]
https://www.youtube.com/@bnab