Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright and Credits
Hands-On Cybersecurity with Blockchain
Humble Bundle About Packt
Why subscribe? PacktPub.com
Contributors
About the author About the reviewer Packt is searching for authors like you
Preface
Who this book is for What this book covers To get the most out of this book
Download the color images Conventions used
Get in touch
Reviews
Disclaimer
Cyber Threat Landscape and Security Challenges
Current threat landscape
Ransomware
The monetization of hacking  WannaCry NotPetya SimpleLocker TeslaCrypt CryptoLocker PC Cyborg
Distributed denial-of-service (DDoS) attacks
From script kiddies to geopolitical Ease of launching a DDoS attack Top targeted countries
Insider threats
Some more ways to define insider threats Insider threat profile
Data breaches
Notable recent data breaches Impact of data breaches
Advanced persistence threat (APT)
What makes APTs so different?
Defender perspectives
Governments
The United States (US) The United Kingdom (UK) Europe India
Corporate
Endpoint detection and response (EDR) Deception technology Cyber threat intelligence (CTI)
Live attack execution Emerging security challenges Summary Questions Further reading
Security Must Evolve
The security ecosystem  The zero-trust approach The assume breach approach Evolution at the foundation layer Summary Questions  Further reading 
Introducing Blockchain and Ethereum
What is blockchain?
A brief history Fundamentals of the blockchain Who is using blockchain and how?
Internet versus blockchain
IP packet versus block Web app versus dApp
How blockchain works The building blocks of blockchain
Block Cryptography – digital signature and hashing algorithm Consensus – the core of blockchain
Ethereum
History What is Ethereum? Smart contract EVM Gas dApp
Private versus public blockchain
Public blockchain Private blockchain
Business adaptation Summary Questions Further reading
Hyperledger – Blockchain for Businesses
Technical requirements Hyperledger overview Blockchain-as-a-service (BaaS)
Program goal
Architecture and core components Hyperledger Fabric model
Hyperledeger Fabric core components Workings of Hyperledger and transaction processing
Bitcoin versus Ethereum versus Hyperledger Hyperledger Fabric capabilities Lab
Tuna application
Summary Questions
Blockchain on the CIA Security Triad
What is the CIA security triad?
Confidentiality Integrity Availability
Understanding blockchain on confidentiality
Confidentiality in the existing model Businesses, blockchain, and confidentiality Achieving confidentiality with Hyperledger Fabric
Blockchain on integrity
Integrity in the current blockchain network Block arrangement and immutability Achieving integrity with Hyperledger Verifying chain integrity
Understanding blockchain on availability
Availability in the current blockchain network No single point of failure Business and availability
Summary Questions Further reading
Deploying PKI-Based Identity with Blockchain
PKI
PKI in a nutshell The evolution of PKI Components
Asymmetric key encryption Certificate Certificate authority (CA) Registration authority (RA) Certificate repository (CR)
Architecture Certificate life cycle Key management
Challenges of the existing PKI model How can blockchain help?
Decentralized infrastructure Deployment method Requirements 
Lab
Testing
Summary Questions Further reading
Two-Factor Authentication with Blockchain
What is 2FA?
Evolution of user authentication Why 2FA? How does it work? Challenges
Blockchain for 2FA
How can blockchain transform 2FA? Solution architecture
Lab
Components Preparation
Installing Node.js Turning up Ethereum Turning up the smart contract Testing and verification
Summary Questions Further reading
Blockchain-Based DNS Security Platform
DNS Understanding DNS components
Namespace Name servers Resolver
DNS structure and hierarchy 
Root name server Current TLD structure Registries, registrars, and registrants DNS records
DNS topology for large enterprises
Architecture
Challenges with current DNS 
DNS spoofing 
Blockchain-based DNS solution
X.509 PKI replacement MITM-proof DNS infrastructure
Lab on Ethereum-based secure DNS infrastructure
Lab preparation Namecoin blockchain installation Installing PowerDNS Installing DNSChain
Summary Questions Further reading
Deploying Blockchain-Based DDoS Protection
DDoS attacks
What is a DDoS attack? How does it work?
Building up the botnet Reconnaissance Weaponization Delivery Exploitation  Installation  Command and control (C2) Action on objectives
Types of DDoS attacks
Attacks targeting network resources
User datagram protocol (UDP) flood ICMP flood Internet Group Management Protocol (IGMP) flood Amplification attacks
Attacks targeting server resources
TCP SYN Flood TCP RST attack Secure sockets layer (SSL)-based attack Encrypted HTTP attacks
Attacks targeting application resources
DNS flooding  Regular expression DoS attacks  Hash collision DoS attacks
Challenges with current DDoS solutions How can blockchain transform DDoS protection? Lab Summary  Questions Further reading
Facts about Blockchain and Cyber Security
Decision path for blockchain
When should you use blockchain? When should you not use blockchain?
Leader's checklist Challenges with blockchain The future of cybersecurity with blockchain Summary Questions Further reading
Assessment
Chapter 1: Cyber Threat Landscape and Security Challenges Chapter 2: Security Must Evolve Chapter 3: Introducing Blockchain and Ethereum Chapter 4: Hyperledger – Blockchain for Businesses Chapter 5: Blockchain on the CIA Security Triad  Chapter 6: Deploying PKI-Based Identity with Blockchain Chapter 7: Two-Factor Authentication with Blockchain Chapter 8: Blockchain-Based DNS Security Platform Chapter 9: Deploying Blockchain-Based DDoS Protection Chapter 10: Facts about Blockchain and Cyber Security
Other Books You May Enjoy
Leave a review - let other readers know what you think
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion