How Blockchain Can Improve Your
Cyber Security
The blockchain is a developing technology, one that can make the web much more secure, so
how can it be practically implemented into your cybersecurity?
What Is A Blockchain?
Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the
blockchain, and every user of the network is responsible for verifying that the data being added
is real. To form a blockchain, users utilise powerful computers to perform complex mathematical
problems, once the problem is solved it forms a block, which then gets added onto the chain of
already performed calculations, which gradually become more difficult. This data remains on the
network forever, it cannot be altered or removed.
Public And Private Blockchains
Public blockchains allow any and every user to join the blockchain, there is no organisation or
individual that controls the blockchain. Public blockchains use the internet to allow connections
to take place, from which everyone can view, create and verify data, a primary example of this is
Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient
to cyberattacks as attackers require control over half of the network in order for them to be able
to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the
large number of users attempting to reach a consensus, this also leads to a large amount of
energy consumption.
Private blockchains have a single entity that restricts what users are permitted to access the
network and what users can do on the network, such as whether they can view, create and/or
verify data, this allows businesses and organisations to utilise blockchain technology in a private
environment. Because there is only one entity that controls the network, attackers are unable to
manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
On the other hand, private blockchains are much faster and more efficient than public
blockchains and use far less energy.
Decentralised Storage
With decentralised storage there comes some risk. For example, decentralised storage will
increase the number of attack vectors for attackers. However, a decentralised storage system is
highly resilient, so even if the system is exposed, it will be very difficult for the attacker to
change or remove any data stored on the blockchain. This is because each node (a user that
offers storage space) independently verifies every piece of data throughout the system. This
means that as long as one unaffected node remains within a network (that may number in
millions) all data can be restored.
Prevent DDoS Using Decentralized Nodes
Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so
much data that it cannot process the data fast enough, causing a slowdown or crash for the
system. By using a decentralised blockchain system, the network has much more resources
available to it, meaning that attackers require a lot more resources to have any effect. When one
node is attacked and overwhelmed, another totally separate node will take its place to process
the data. This will continue until all nodes on the network are overwhelmed, but on a
decentralised network, the number of nodes can number in the millions.
Attacking Blockchains
Phishing attacks are scamming attempts where the attacker pretends to be someone of
authority, such as an employee's boss or a computer technician, or maybe by using a fake
replica website in order to steal data such as account details.
Routing attacks are where data that is in transit to and from the user is intercepted, and can be
analysed or modified by the attackers to their advantage, routing attacks are also difficult to
detect as there are little to no signs to the victim that there is an attacker.
Sybil attacks use many false network identities to flood a network and crash the system, similar
to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple
identity disorder).
51% attacks happen when attackers manage to pool enough resources together that they are
able to provide more than 50% of the network’s mining power. Having more than 50% of the
power gives the attacker control over the ledger and they are able to manipulate it.
Because of the blockchain’s tendency to be more secure than your average network, attackers
will instead attack the external connections to the blockchains, such as cryptocurrency
exchanges and cryptocurrency wallets, so far, many millions have already been stolen.
Attackers manage this through 3 primary methods, one method is by stealing private keys, keys
are personal digital signatures that are used to access cryptocurrency wallets. A second method
is to hack an employee account for one of the exchanges, which may give the attackers access
to user data and thereafter, user accounts and wallets. The third attack method is through code
exploitation, where attackers find a security hole in the code of an exchange and utilise this to
their benefit.
Due to these external attacks, users will lose lots of personal funds, which leads to users
quitting the blockchain network as they no longer have much of a financial incentive if all of their
funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may
cover the lost user funds, but this is an expensive solution, and if the security is not improved
then these attacks become frequent, and the company may run out of funds to repay user
losses.

More Related Content

PDF
Blockchain for CyberSecurity | Blockchain and CyberSecurity
PPTX
BLOCK CHAIN technology for the students.
PPTX
Blockchain.pptx
PDF
The Different Uses Of Block Chain.pdf
PDF
6 Key Blockchain Features You Need to Know Now
PPTX
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
PPTX
Block Chain Technology Chapter No 2.pptx
PPTX
622640_AYUSH KATIYAR_Cyber-Security In Blockchain Technology.pptx
Blockchain for CyberSecurity | Blockchain and CyberSecurity
BLOCK CHAIN technology for the students.
Blockchain.pptx
The Different Uses Of Block Chain.pdf
6 Key Blockchain Features You Need to Know Now
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Block Chain Technology Chapter No 2.pptx
622640_AYUSH KATIYAR_Cyber-Security In Blockchain Technology.pptx

Similar to How Blockchain Can Improve Your Cyber Security (20)

DOCX
Blockchain Assignment
PDF
Notes_1164_UNIT-2parent) block in the chain. Timestamp: It is a system th...
PPTX
Latest technology trends Blockchain.pptx
PPTX
Dr Asad Ali Jaffari Introduction to Fintech 4.pptx
PPTX
blockchain ppt for research puropse in the university
PDF
Blockchain Technology in Cybersecurity.pdf
PDF
Comprehensive List Of Blockchain Security Tools
PDF
Role of Blockchain Technology in Cybersecurity.pdf
PDF
Role of Blockchain Technology in Cybersecurity
PDF
Role of Blockchain Technology in Cybersecurity
PPTX
B Tech BLOCKCHAIN TECHNOLOGY_UNIT-I.pptx
PDF
The Truth About Blockchain.pdf
PDF
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
PDF
Blockchaintech
DOCX
Blockchain could be a data structure that could be a growing list of informat...
PDF
solulab.com-What is Blockchain Technology.pdf
PDF
What is Blockchain Technology? A Beginner’s Guide.pdf
PPTX
chapter 4 Selected Topics in computer.pptx
PPTX
chapter 4 Selected Topics in computer.pptx
PDF
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Assignment
Notes_1164_UNIT-2parent) block in the chain. Timestamp: It is a system th...
Latest technology trends Blockchain.pptx
Dr Asad Ali Jaffari Introduction to Fintech 4.pptx
blockchain ppt for research puropse in the university
Blockchain Technology in Cybersecurity.pdf
Comprehensive List Of Blockchain Security Tools
Role of Blockchain Technology in Cybersecurity.pdf
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
B Tech BLOCKCHAIN TECHNOLOGY_UNIT-I.pptx
The Truth About Blockchain.pdf
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Blockchaintech
Blockchain could be a data structure that could be a growing list of informat...
solulab.com-What is Blockchain Technology.pdf
What is Blockchain Technology? A Beginner’s Guide.pdf
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency

More from Daniel Martin (8)

PDF
Activities To Do In And Around Poole, Dorset
PDF
Different Types Of Cyber Security Threats
PDF
What Makes A Good Local Councillor
PDF
What Is The Role Of A Local Councillor
PDF
Tackling Fraudulent Benefit Claims: A Council's Responsibility
PDF
The History Of Poole
PDF
Things to do in Poole
PDF
Poole Councillors .pdf
Activities To Do In And Around Poole, Dorset
Different Types Of Cyber Security Threats
What Makes A Good Local Councillor
What Is The Role Of A Local Councillor
Tackling Fraudulent Benefit Claims: A Council's Responsibility
The History Of Poole
Things to do in Poole
Poole Councillors .pdf

Recently uploaded (20)

PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
Modernising the Digital Integration Hub
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
The various Industrial Revolutions .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Consumable AI The What, Why & How for Small Teams.pdf
DOCX
search engine optimization ppt fir known well about this
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Modernising the Digital Integration Hub
2018-HIPAA-Renewal-Training for executives
A contest of sentiment analysis: k-nearest neighbor versus neural network
The various Industrial Revolutions .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Final SEM Unit 1 for mit wpu at pune .pptx
STKI Israel Market Study 2025 version august
Consumable AI The What, Why & How for Small Teams.pdf
search engine optimization ppt fir known well about this
Microsoft Excel 365/2024 Beginner's training
Taming the Chaos: How to Turn Unstructured Data into Decisions
Convolutional neural network based encoder-decoder for efficient real-time ob...
Chapter 5: Probability Theory and Statistics
Custom Battery Pack Design Considerations for Performance and Safety
A proposed approach for plagiarism detection in Myanmar Unicode text

How Blockchain Can Improve Your Cyber Security

  • 1. How Blockchain Can Improve Your Cyber Security The blockchain is a developing technology, one that can make the web much more secure, so how can it be practically implemented into your cybersecurity? What Is A Blockchain? Blockchains are distributed (or peer-to-peer) networks. Every user can add information to the blockchain, and every user of the network is responsible for verifying that the data being added is real. To form a blockchain, users utilise powerful computers to perform complex mathematical problems, once the problem is solved it forms a block, which then gets added onto the chain of already performed calculations, which gradually become more difficult. This data remains on the network forever, it cannot be altered or removed. Public And Private Blockchains Public blockchains allow any and every user to join the blockchain, there is no organisation or individual that controls the blockchain. Public blockchains use the internet to allow connections to take place, from which everyone can view, create and verify data, a primary example of this is Bitcoin. Because of the typically high number of nodes on a public blockchain, they are resilient to cyberattacks as attackers require control over half of the network in order for them to be able to manipulate the ledger. However, public blockchains are very inefficient and slow, due to the large number of users attempting to reach a consensus, this also leads to a large amount of energy consumption. Private blockchains have a single entity that restricts what users are permitted to access the network and what users can do on the network, such as whether they can view, create and/or verify data, this allows businesses and organisations to utilise blockchain technology in a private environment. Because there is only one entity that controls the network, attackers are unable to manipulate the ledger by taking a majority, however, this makes phishing attacks very effective.
  • 2. On the other hand, private blockchains are much faster and more efficient than public blockchains and use far less energy. Decentralised Storage With decentralised storage there comes some risk. For example, decentralised storage will increase the number of attack vectors for attackers. However, a decentralised storage system is highly resilient, so even if the system is exposed, it will be very difficult for the attacker to change or remove any data stored on the blockchain. This is because each node (a user that offers storage space) independently verifies every piece of data throughout the system. This means that as long as one unaffected node remains within a network (that may number in millions) all data can be restored. Prevent DDoS Using Decentralized Nodes Distributed Denial of Service (DDoS) attacks have the goal of overloading a network with so much data that it cannot process the data fast enough, causing a slowdown or crash for the system. By using a decentralised blockchain system, the network has much more resources available to it, meaning that attackers require a lot more resources to have any effect. When one node is attacked and overwhelmed, another totally separate node will take its place to process the data. This will continue until all nodes on the network are overwhelmed, but on a decentralised network, the number of nodes can number in the millions. Attacking Blockchains Phishing attacks are scamming attempts where the attacker pretends to be someone of authority, such as an employee's boss or a computer technician, or maybe by using a fake replica website in order to steal data such as account details. Routing attacks are where data that is in transit to and from the user is intercepted, and can be analysed or modified by the attackers to their advantage, routing attacks are also difficult to detect as there are little to no signs to the victim that there is an attacker. Sybil attacks use many false network identities to flood a network and crash the system, similar to a DDoS attack (the name Sybil is a reference to a book character diagnosed with a multiple identity disorder). 51% attacks happen when attackers manage to pool enough resources together that they are able to provide more than 50% of the network’s mining power. Having more than 50% of the power gives the attacker control over the ledger and they are able to manipulate it. Because of the blockchain’s tendency to be more secure than your average network, attackers will instead attack the external connections to the blockchains, such as cryptocurrency exchanges and cryptocurrency wallets, so far, many millions have already been stolen. Attackers manage this through 3 primary methods, one method is by stealing private keys, keys are personal digital signatures that are used to access cryptocurrency wallets. A second method is to hack an employee account for one of the exchanges, which may give the attackers access to user data and thereafter, user accounts and wallets. The third attack method is through code
  • 3. exploitation, where attackers find a security hole in the code of an exchange and utilise this to their benefit. Due to these external attacks, users will lose lots of personal funds, which leads to users quitting the blockchain network as they no longer have much of a financial incentive if all of their funds are going to be stolen afterwards anyways. As an attempt to retain users, companies may cover the lost user funds, but this is an expensive solution, and if the security is not improved then these attacks become frequent, and the company may run out of funds to repay user losses.