万本电子书0元读

万本电子书0元读

顶部广告

Hands-On Cybersecurity with Blockchain电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Rajneesh Gupta

出  版  社:Packt Publishing

出版时间:2018-06-28

字       数:23.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book ? Understanding the blockchain technology from the cybersecurity perspective ? Developing cyber security solutions with Ethereum blockchain technology ? Understanding real-world deployment of blockchain based applications Who This Book Is For The book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage. What You Will Learn ? Understand the cyberthreat landscape ? Learn about Ethereum and Hyperledger Blockchain ? Program Blockchain solutions ? Build Blockchain-based apps for 2FA, and DDoS protection ? Develop Blockchain-based PKI solutions and apps for storing DNS entries ? Challenges and the future of cybersecurity and Blockchain In Detail Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world’s most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions. Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain. Style and approach This book will follow a practical approach to help understand blockchain technology to transform cybersecurity solutions
目录展开

Title Page

Copyright and Credits

Hands-On Cybersecurity with Blockchain

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Disclaimer

Cyber Threat Landscape and Security Challenges

Current threat landscape

Ransomware

The monetization of hacking

WannaCry

NotPetya

SimpleLocker

TeslaCrypt

CryptoLocker

PC Cyborg

Distributed denial-of-service (DDoS) attacks

From script kiddies to geo-political

Ease of launching a DDoS

Top targeted countries

Insider threats

Some more ways to define insider threats

Insider threat profile

Data breaches

Notable recent data breaches

Impact of data breaches

Advanced persistence threat (APT)

What makes APT so different?

Defender perspectives

Government

The United States (US)

The United Kingdom (UK)

Europe

India

Corporate

Endpoint detection and response (EDR)

Deception technology

Cyber threat intelligence (CTI)

Live attack execution

Emerging security challenges

Summary

Questions

Further reading

Security Must Evolve

The security ecosystem

The zero-trust approach

The assume breach approach

Evolution at the foundation layer

Summary

Questions

Further reading

Introducing Blockchain and Ethereum

What is blockchain?

A brief history

Fundamentals of the blockchain

Who is using blockchain and how?

Internet versus blockchain

IP packet versus block

Web app versus dApp

How it works?

The building blocks of blockchain

Block

Cryptography – digital signature and hashing algorithm

Consensus – the core of blockchain

Ethereum

History

What is Ethereum?

Smart contract

EVM

Gas

dApp

Private versus public blockchain

Public blockchain

Private blockchain

Business adaptation

Summary

Questions

Further reading

Hyperledger – Blockchain for Businesses

Technical requirements

Hyperledger overview

Blockchain-as-a-service (BaaS)

Program goal

Architecture and core components

Hyperledger Fabric model

Hyperledeger Fabric core components

Working of Hyperledger and transaction processing

Bitcoin versus Ethereum versus Hyperledger

Hyperledger Fabric capabilities

Lab

Tuna application

Summary

Questions

Blockchain on the CIA Security Triad

What is the CIA security triad?

Confidentiality

Integrity

Availability

Understanding blockchain on confidentiality

Confidentiality in the existing model

Businesses, blockchain, and confidentiality

Achieving confidentiality with Hyperledger Fabric

Blockchain on integrity

Integrity in the current blockchain network

Block arrangement and immutability

Achieving integrity with Hyperledger

Verifying chain integrity

Understanding blockchain on availability

Availability in the current blockchain network

No single point of failure

Business and availability

Summary

Questions

Further reading

Deploying PKI-Based Identity with Blockchain

PKI

PKI in a nutshell

The evolution of PKI

Components

Asymmetric key encryption

Certificate

Certificate authority (CA)

Registration authority (RA)

Certificate repository (CR)

Architecture

Certificate life cycle

Key management

Challenges of the existing PKI model

How can blockchain help?

Decentralized infrastructure

Deployment method

Requirements

Lab

Testing

Summary

Questions

Further reading

Two-Factor Authentication with Blockchain

What is 2FA?

Evolution of user authentication

Why 2FA?

How does it work?

Challenges

Blockchain for 2FA

How blockchain can transform 2FA?

Solution architecture

Lab

Components

Preparation

Installing Node.js

Turning up Ethereum

Turning up the smart contract

Testing and verification

Summary

Questions

Further reading

Blockchain-Based DNS Security Platform

DNS

Understanding DNS components

Namespace

Name servers

Resolver

DNS structure and hierarchy

Root name server

Current TLD structure

Registries, registrars, and registrants

DNS records

DNS topology for large enterprise

Architecture

Challenges with current DNS

DNS spoofing

Blockchain-based DNS solution

X.509 PKI replacement

MITM-proof DNS infrastructure

Lab on Ethereum-based secure DNS infrastructure

Lab preparation

Namecoin blockchain installation

Installing PowerDNS

Installing DNSChain

Summary

Questions

Further reading

Deploying Blockchain-Based DDoS Protection

DDoS attacks

What is a DDoS attack?

How does it work?

Building up the botnet

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and control (C2)

Action on objectives

Types of DDoS attack

Attacks targeting network resources

User datagram protocol (UDP) flood

ICMP flood

Internet Group Management Protocol (IGMP) flood

Amplification attacks

Attacks targeting server resources

TCP SYN Flood

TCP RST attack

Secure sockets layer (SSL) based attack

Encrypted HTTP attacks

Attacks targeting application resources

DNS flooding

Regular expression DoS attacks

Hash collision DoS attacks

Challenges with current DDoS solutions

How blockchain can transform DDoS protection?

Lab

Summary

Questions

Further reading

Facts about Blockchain and Cyber Security

Decision path for blockchain

When should you use blockchain?

When should you not use blockchain?

Leader's checklist

Challenges with blockchain

The future of cyber security with blockchain

Summary

Questions

Further reading

Assessment

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部