Copy of Copy of AI Tech Agency Infographics by Slidesgo.pptx
yash98012
12 views
20 slides
Feb 25, 2025
Slide 1 of 20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
About This Presentation
college ppt
Size: 3.57 MB
Language: en
Added: Feb 25, 2025
Slides: 20 pages
Slide Content
Zero Trust Architecture: Reimagining network security Name: Anjali Dayal Name: Sumit Kumar Roll: 11500221047 Roll: 115001221048 Name: Dinesh Chell Name: Purendu Palui Roll: 11500221049 Roll:11500221050 B. P. Poddar Institute of Management & Technology
CONTENTS INTRODUCTION . S S R P F
INTRODUCTION Cyber threats are evolving rapidly, and traditional network security models are struggling to keep up. The traditional perimeter-based security approach assumes that once inside the corporate network, users and devices can be trusted. This is where Zero Trust Architecture (ZTA) comes into play. Unlike traditional security models, Zero Trust assumes that threats exist both outside and inside the network. It follows a “Never Trust, Always Verify” principle, ensuring continuous verification of identities, devices, and access requests. Zero Trust is a modern security framework that eliminates implicit trust and enforces strict identity verification for every user and device trying to access resources, regardless of whether they are inside or outside the network perimeter.
The Evolving Threat Landscape: Why Traditional Security Fails Perimeter-Based Approach Traditional security relied on a perimeter-based approach, assuming that anything inside the network was trustworthy. This assumption is no longer valid. Increased Sophistication Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging. Perimeter-Based Approach Perimeter-Based Approach Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging. Cyberattacks have become increasingly sophisticated, targeting vulnerabilities that extend beyond the perimeter. Breaches are more frequent and damaging.
Solidity: Solidity is a programming language used for writing smart contracts on the Ethereum platform. It allows for the creation of decentralized applications ( dApps ) that run directly on the Ethereum blockchain. It enables automation, security, and immutability, providing a transparent product verification system. Ethereum: Ethereum is a decentralized platform for building and running dApps , supported by the Ethereum Virtual Machine (EVM). Ethereum enables peer-to-peer transactions and smart contract execution, central to providing a decentralized solution for fake product identification. Software Specification
Truffle Framework: Truffle is a development environment and testing framework for Ethereum blockchain applications.Simplifies tasks like contract compilation, testing, and deployment. Developers can use Truffle to write, deploy, and test smart contracts on various Ethereum networks. Ganache: Ganache is a personal Ethereum blockchain for development purposes, available as both a desktop application (Ganache UI) and a command-line tool (Ganache CLI). It simulates Ethereum transactions, enabling developers to test smart contracts in a controlled, safe environment before deployment. MetaMask: MetaMask is an Ethereum wallet and browser extension, enabling secure interaction with Ethereum-based decentralized applications. It acts as a gateway to interact with the blockchain, allowing transactions to be securely signed.
Our developed system is built around three main components: Manufacturer : Manufacturer Registration: Manufacturers must first sign up using their credentials, with data stored securely in the MongoDB database. During the manufacturer registration process, the following inputs are : Note : System use Maufacturer brand name as username and Manufacturer’s blockchain account address as Password. Software Architecture and Implementation 1. Manufacturer 2. Seller 3. Customer Manufacturer Company Name: The official name of the manufacturing company. Manufacturer Brand Name: The brand associated with the company's products. Manufacturer CEO: The name of the Chief Executive Officer of the company. Manufacturer Phone No: Contact number for communication and verification. Manufacturer Address: The official address of the manufacturing company.
Seller Registration: After successful Login, manufacturers can register genuine sellers in the system, creating a trust chain. Product Registration: Manufacturers register their products on the blockchain by adding unique product details. QR Code Generation: For each registered product, a unique QR Code is generated and attached to the product packaging. Sell Products to Verified Sellers: The manufacturer scans the product's QR code and transfers ownership to a genuine seller, ensuring traceability.
WORKFLOW
Some Snippets of the outcomes Results and Outcomes