Copy of Copy of AI Tech Agency Infographics by Slidesgo.pptx

yash98012 12 views 20 slides Feb 25, 2025
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

college ppt


Slide Content

Zero Trust Architecture: Reimagining network security Name: Anjali Dayal Name: Sumit Kumar Roll: 11500221047 Roll: 115001221048 Name: Dinesh Chell Name: Purendu Palui Roll: 11500221049 Roll:11500221050 B. P. Poddar Institute of Management & Technology

CONTENTS INTRODUCTION . S S R P F

INTRODUCTION Cyber threats are evolving rapidly, and traditional network security models are struggling to keep up. The traditional perimeter-based security approach assumes that once inside the corporate network, users and devices can be trusted. This is where Zero Trust Architecture (ZTA) comes into play. Unlike traditional security models, Zero Trust assumes that threats exist both outside and inside the network. It follows a “Never Trust, Always Verify” principle, ensuring continuous verification of identities, devices, and access requests. Zero Trust is a modern security framework that eliminates implicit trust and enforces strict identity verification for every user and device trying to access resources, regardless of whether they are inside or outside the network perimeter.

The Evolving Threat Landscape: Why Traditional Security Fails Perimeter-Based Approach Traditional security relied on a perimeter-based approach, assuming that anything inside the network was trustworthy. This assumption is no longer valid. Increased Sophistication Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging. Perimeter-Based Approach Perimeter-Based Approach Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging. Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging.

Solidity: Solidity is a programming language used for writing smart contracts on the Ethereum platform. It allows for the creation of decentralized applications ( dApps ) that run directly on the Ethereum blockchain. It enables automation, security, and immutability, providing a transparent product verification system. Ethereum: Ethereum is a decentralized platform for building and running dApps , supported by the Ethereum Virtual Machine (EVM). Ethereum enables peer-to-peer transactions and smart contract execution, central to providing a decentralized solution for fake product identification. Software Specification

Truffle Framework: Truffle is a development environment and testing framework for Ethereum blockchain applications.Simplifies tasks like contract compilation, testing, and deployment. Developers can use Truffle to write, deploy, and test smart contracts on various Ethereum networks. Ganache: Ganache is a personal Ethereum blockchain for development purposes, available as both a desktop application (Ganache UI) and a command-line tool (Ganache CLI). It simulates Ethereum transactions, enabling developers to test smart contracts in a controlled, safe environment before deployment. MetaMask: MetaMask is an Ethereum wallet and browser extension, enabling secure interaction with Ethereum-based decentralized applications. It acts as a gateway to interact with the blockchain, allowing transactions to be securely signed.

Our developed system is built around three main components: Manufacturer : Manufacturer Registration: Manufacturers must first sign up using their credentials, with data stored securely in the MongoDB database. During the manufacturer registration process, the following inputs are : Note : System use Maufacturer brand name as username and Manufacturer’s blockchain account address as Password. Software Architecture and Implementation 1. Manufacturer 2. Seller 3. Customer Manufacturer Company Name: The official name of the manufacturing company. Manufacturer Brand Name: The brand associated with the company's products. Manufacturer CEO: The name of the Chief Executive Officer of the company. Manufacturer Phone No: Contact number for communication and verification. Manufacturer Address: The official address of the manufacturing company.

Seller Registration: After successful Login, manufacturers can register genuine sellers in the system, creating a trust chain. Product Registration: Manufacturers register their products on the blockchain by adding unique product details. QR Code Generation: For each registered product, a unique QR Code is generated and attached to the product packaging. Sell Products to Verified Sellers: The manufacturer scans the product's QR code and transfers ownership to a genuine seller, ensuring traceability.

WORKFLOW

Some Snippets of the outcomes Results and Outcomes

Results and Outcomes

IMPACT

CONCLUSION

THANK YOU!
Tags