Blockchain and Cyber Defense Strategies in new genre times
anupriti
412 views
146 slides
Jun 30, 2024
Slide 1 of 146
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
About This Presentation
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance ...
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
Secure Network Configuration
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Phishing Prevention
Secure Network Configuration
Data Encryption
Backup and Disaster Recovery
Endpoint protection
Incident response planning
Security policies and procedures
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Antivirus/Antimalware Software
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Security Monitoring and Incident Response
Backup and Disaster Recovery
Endpoint protection
Network monitoring and loggingIncident response planning
Secure virtualization practices
Security policies and procedures SIEM
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Endpoint protection
Physical security controls
Network monitoring and loggingIncident response planning
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Security audits and assessments
Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and loggingIncident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments
Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF)Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and loggingIncident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments
CYBER SECURITY
ONE HUNDRED PERCENT
PROTECTION DOES NOT EXIST
MAKE THE PROBLEM
HARDER FOR CRIMINALS
TO BREAK
FOR THE
UNversed
WHAT
IS
An Overall View……
BLOCKwith
some DATA
BLOCKwith
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA
SHA-256 (Hash algorithm)
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
There are 100’s of
algorithms & this is one
TYPE
BLOCKwith
some DATA
SHA-256 (Hash algorithm)
6bcec30f359e597986bcdc075eed3e339a3a1
8673ec4624425d75247eacce9f5
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary sizeto a bit array of a
fixed size
BLOCKwith
some DATA
Text input : TALK ON 27 JUN 2024
HASH
HASH
Let this be a sample
TEXT data and be
applied HASH upon
Text input : TALK ON 27 JUN 2024
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
WATCH HERE
Text input : TALK ON 27 JUn2024
eb23df9940ebe8ad1ad9ef271e7de5923e7b45
93199ce699f82c9e4986df737b
HASH
WATCH HERE
•Enterprise routers/switches: Smaller process (14nm-7nm) for better
performance and lower power consumption.
•Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES
ANTIVIRUS-UTMs-FIREWALLS
ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during
manufacturing
SEMI CONDUCTORS & PROCESSORS
SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nmchip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?
15 to 25 countries
MAIN FRAME OS
•Unisys
•IBM
•Fujitso
•HP
•BULL
•Vendor Lock-in
•Limited Customization
•Potential Backdoors
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
CRYPTOGRAPHY
USA -NIST
RUSSIA -GOST
(GosudarstvennyĭStandart)
China -SCA (State Cryptography
Administration)
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW