Security

6 Use Cases For Blockchain In Security

blockchain

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

Blockchain is a decentralized, distributed electronic ledger built on the model of offering absolute security and trust. Using cryptography, transactions are recorded chronologically and publicly, each one time-stamped and linked to the previous one. Critically, these digital ‘blocks’ can only be updated through the consensus of all participants, with data interception, modification and deletion near impossible.

As a result, since hitting Gartner’s fabled “peak of the hype cycle” in 2016, Blockchain has become something of a priority for industry leaders, especially in financial services, energy and manufacturing. Authenticating Bitcoin payments has perhaps become the most cited use case, but this technology can extend to applications like content delivery networks and smart grid systems too.

How does blockchain apply to cyber security?

Blockchain has the potential to improve everything from improving data integrity and digital identities to enabling safer IoT devices to prevent DDoS attacks. Indeed, blockchain might play across the ‘CIA triad’ of confidentiality, integrity and availability, offering improved resilience, encryption, auditing and transparency.

Our new gaming site is live! Gamestar covers games, gaming gadgets and gear. Subscribe to our newsletter and we’ll email our best stuff right to your inbox. Learn more here.
“Blockchain plugs the gaps that we have left with our poor implementation of security and lack of trustworthiness,” said Bill Buchanan, an acclaimed computer scientist and professor at the School of Computing at Edinburgh Napier University. “In 2018, we must encrypt by default. At the current time, you cannot verify that no one has read an email sent to you, and that it hasn’t been modified. We often can’t even verify the sender.”

“Blockchain plugs the gaps that we have left with our poor implementation of security and lack of trustworthiness,” said Bill Buchanan, an acclaimed computer scientist and professor at the School of Computing at Edinburgh Napier University. “In 2018, we must encrypt by default. At the current time, you cannot verify that no one has read an email sent to you, and that it hasn’t been modified. We often can’t even verify the sender.”

Read More: 6 Use Cases For Blockchain In Security

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *