Search icon CANCEL
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Hands-On Cybersecurity with Blockchain.

You're reading from  Hands-On Cybersecurity with Blockchain.

Product type Book
Published in Jun 2018
Publisher
ISBN-13 9781788990189
Pages 236 pages
Edition 1st Edition
Languages
Concepts
Author (1):
Rajneesh Gupta Rajneesh Gupta
Profile icon Rajneesh Gupta

Table of Contents (17) Chapters

Title Page
About Packt
Contributors
Preface
1. Cyber Threat Landscape and Security Challenges 2. Security Must Evolve 3. Introducing Blockchain and Ethereum 4. Hyperledger – Blockchain for Businesses 5. Blockchain on the CIA Security Triad 6. Deploying PKI-Based Identity with Blockchain 7. Two-Factor Authentication with Blockchain 8. Blockchain-Based DNS Security Platform 9. Deploying Blockchain-Based DDoS Protection 10. Facts about Blockchain and Cyber Security 1. Assessment 2. Other Books You May Enjoy Index

Index

A

  • Advanced Encryption Standard (AES) / SimpleLocker
  • advanced persistence threat (APT)
    • about / Advanced persistence threat (APT)
    • advanced / Advanced persistence threat (APT)
    • persistent / Advanced persistence threat (APT)
    • threat / Advanced persistence threat (APT)
    • targets / What makes APTs so different?
    • goal / What makes APTs so different?
    • human factors / What makes APTs so different?
  • Aggregate Caching Forwarder (ACF) / Architecture
  • amplification attack / Amplification attacks
  • Annual Privacy Forum (APF) / Europe
  • Apache Software Foundation (ASF) / Workings of Hyperledger and transaction processing
  • application binary interface (ABI) / Smart contract
  • application resources
    • targeting / Attacks targeting application resources
    • DNS flooding / DNS flooding 
    • regular expression DoS attacks / Regular expression DoS attacks 
    • hash collision DoS attacks / Hash collision DoS attacks
  • architecture, Hyperledger
    • consensus layer / Architecture and core components
    • contract layer / Architecture and core components
    • communication layer / Architecture and core components
    • data store abstraction / Architecture and core components
    • crypto abstraction / Architecture and core components
    • identity services / Architecture and core components
    • policy services / Architecture and core components
    • APIs / Architecture and core components
    • interoperation / Architecture and core components
  • artificial neural network (ANN) / The security ecosystem 
  • assume breach approach
    • about / The assume breach approach
    • red-term exercise / The assume breach approach
    • continuous monitoring / The assume breach approach
  • asymmetric encryption / Asymmetric key encryption
  • Attribute-based access control (ABAC) / Achieving confidentiality with Hyperledger Fabric
  • attribute certificate (ACert) / Achieving confidentiality with Hyperledger Fabric
  • Attribute Certificate Authority (ACA) / Achieving confidentiality with Hyperledger Fabric
  • authoritative name servers
    • master server / Name servers
    • slave server / Name servers
  • autonomous propagation / Delivery
  • availability
    • using, in blockchain / Understanding blockchain on availability, Availability in the current blockchain network
    • system failure, avoiding / No single point of failure
    • determining / Business and availability
  • Availability, Integrity, and Confidentiality (AIC) security triad / What is the CIA security triad?

B

  • back-chaining propagation / Delivery
  • BIND / DNS topology for large enterprises
  • bitcoin (BTC)
    • about / Consensus – the core of blockchain
    • versus Ethereum / Bitcoin versus Ethereum versus Hyperledger
  • block
    • about / Block
    • header / Block
    • version / Block
    • timestamp / Block
    • hash / Block
    • nonce / Block
    • hash of Merkle root / Block
    • body / Block
  • block body / IP packet versus block
  • blockchain
    • about / What is blockchain?
    • history / A brief history
    • fundamentals / Fundamentals of the blockchain
    • using / Who is using blockchain and how?, When should you use blockchain?
    • versus internet / Internet versus blockchain
    • transaction preparation / How blockchain works
    • transaction verification / How blockchain works
    • block generation / How blockchain works
    • block validation / How blockchain works
    • building blocks / The building blocks of blockchain
    • block / Block
    • cryptography / Cryptography – digital signature and hashing algorithm
    • consensus / Consensus – the core of blockchain
    • use cases / Business adaptation
    • permission restrictions / Bitcoin versus Ethereum versus Hyperledger
    • data access, restrictions / Bitcoin versus Ethereum versus Hyperledger
    • consensus mechanism / Bitcoin versus Ethereum versus Hyperledger
    • scalability / Bitcoin versus Ethereum versus Hyperledger
    • anonymity / Bitcoin versus Ethereum versus Hyperledger
    • governance / Bitcoin versus Ethereum versus Hyperledger
    • native currency / Bitcoin versus Ethereum versus Hyperledger
    • scripting / Bitcoin versus Ethereum versus Hyperledger
    • used, for transforming DDoS protection / How can blockchain transform DDoS protection?
    • decision path / Decision path for blockchain
    • avoiding / When should you not use blockchain?
    • challenges / Challenges with blockchain
    • cyber security, future / The future of cybersecurity with blockchain
  • Blockchain-as-a-service (BaaS) / Blockchain-as-a-service (BaaS)
  • blockchain-based DNS solution
    • about / Blockchain-based DNS solution
    • X.509 PKI replacement / X.509 PKI replacement
    • MITM-proof DNS infrastructure / MITM-proof DNS infrastructure
  • block header / IP packet versus block
  • booster script / Weaponization
  • botnet / What is a DDoS attack?
  • bots / Distributed denial-of-service (DDoS) attacks, What is a DDoS attack?
  • Breach Level Index (BLI) / The future of cybersecurity with blockchain
  • Bring Your Own Device (BYOD) / Corporate
  • building blocks, Hyperledger
    • shared ledger / Architecture and core components
    • consensus algorithm / Architecture and core components
    • privacy / Architecture and core components
    • smart contract / Architecture and core components

C

  • CA / Certificate authority (CA)
  • Canonical Name (CNAME) / DNS records
  • capabilities, Hyperledger Fabric
    • identity management / Hyperledger Fabric capabilities
    • efficient processing / Hyperledger Fabric capabilities
    • privacy / Hyperledger Fabric capabilities
    • confidentiality / Hyperledger Fabric capabilities
    • chaincode functionality / Hyperledger Fabric capabilities
  • central source propagation / Delivery
  • certificate authority (CA)
    • about / PKI in a nutshell
    • public digital certificate authority / Certificate authority (CA)
    • private digital certificate authority / Certificate authority (CA)
  • certificate repository (CR) / Certificate repository (CR)
  • certificate revocation list (CRL) / Certificate authority (CA)
  • certificates
    • Secure Socket Layer (SSL) certificate / Certificate
    • client certificate / Certificate
    • code signing certificate / Certificate
    • email certificate / Certificate
  • chain of trust / Architecture
  • Chief Information Security Officer (CISO) / Corporate
  • cloud-based solution / How does it work?
  • components, DNS
    • namespace / Namespace
    • name servers / Name servers
    • resolver / Resolver
  • components, PKI
    • asymmetric key encryption / Asymmetric key encryption
    • certificate / Certificate
    • CA / Certificate authority (CA)
    • registration authority (RA) / Registration authority (RA)
    • certificate repository (CR) / Certificate repository (CR)
  • Computer Emergency Response Team (CERT-In) / India
  • confidentiality
    • about / Understanding blockchain on confidentiality
    • using, in model / Confidentiality in the existing model
    • using, in businesses / Businesses, blockchain, and confidentiality
    • achieving, with Hyperledger Fabric / Achieving confidentiality with Hyperledger Fabric
  • Confidentiality, Integrity, and Availability (CIA) security triad model
    • about / What is the CIA security triad?
    • confidentiality / Confidentiality
    • integrity / Integrity
    • availability / Availability
  • configuration files / DNS topology for large enterprises
  • consensus
    • about / Consensus – the core of blockchain
    • PoW / Consensus – the core of blockchain
    • PoS / Consensus – the core of blockchain
    • DPoS / Consensus – the core of blockchain
    • PBFT / Consensus – the core of blockchain
  • consortium blockchains / Private blockchain
  • content delivery network (CDN) / Availability
  • corporate
    • about / Corporate
    • endpoint detection and response (EDR) / Endpoint detection and response (EDR)
    • deception technology / Deception technology
    • cyber threat intelligence (CTI) / Cyber threat intelligence (CTI)
  • country code top-level domain (ccTLD) / Registries, registrars, and registrants
  • cryptography / Cryptography – digital signature and hashing algorithm
  • CryptoLocker / CryptoLocker
  • cyber attack
    • reconnaissance / How does it work?
    • weaponization / How does it work?
    • delivery / How does it work?
    • exploitation / How does it work?
    • installation / How does it work?
    • command and control / How does it work?
  • cyber attack prevention strategies
    • attack surface, reducing / The security ecosystem 
    • known threats, preventing / The security ecosystem 
    • unknown threats, preventing / The security ecosystem 
  • cyber kill chain / How does it work?
  • cyber security
    • future, with blockchain / The future of cybersecurity with blockchain
  • cyber strategy
    • URL / The United States (US)
  • cyber threat intelligence (CTI) / Cyber threat intelligence (CTI)

D

  • data breaches
    • about / Data breaches
    • malicious attacks / Data breaches
    • weak security systems / Data breaches
    • human error / Data breaches
    • Equifax in Sep 2017 / Notable recent data breaches
    • Verizon in July 2017 / Notable recent data breaches
    • Edmodo in May 31, 2017 / Notable recent data breaches
    • Verifone in March 7, 2017 / Notable recent data breaches
    • impact / Impact of data breaches
  • data breaches, impact
    • financial loss / Impact of data breaches
    • brand reputation loss / Impact of data breaches
    • customer trust loss / Impact of data breaches
  • data exfiltration
    • URL / What makes APTs so different?
  • decentralized application (dApp) / Web app versus dApp, dApp, Bitcoin versus Ethereum versus Hyperledger
  • decentralized autonomous organization (DAO) / History
  • decentralized public key infrastructure (DPKI)
    • using / Decentralized infrastructure
  • deception technology / Deception technology
  • decision paths
    • about / Decision path for blockchain
    • IBM model / Decision path for blockchain
    • Karl Wust and Arthur Gervais model / Decision path for blockchain
    • Birch-Brown-Parulava model / Decision path for blockchain
  • Delegated Proof of Stack (DPoS) / How blockchain works
  • Democratic National Committee (DNC) / From script kiddies to geopolitical
  • denial-of-service (DoS) attack / DDoS attacks
  • Department of Defense (DoD) / Insider threat profile
  • Department of Justice (DOJ) / Weaponization
  • distributed application (dApp) / Understanding blockchain on availability
  • distributed denial-of-service (DDoS) attacks
    • about / Distributed denial-of-service (DDoS) attacks, Availability, DDoS attacks, What is a DDoS attack?
    • script kiddies, migrating to geo-political / From script kiddies to geopolitical
    • launching / Ease of launching a DDoS attack
    • targeted countries / Top targeted countries
    • working / How does it work?
    • bot, building / Building up the botnet
    • reconnaissance / Reconnaissance
    • weaponization / Weaponization
    • tools / Weaponization
    • delivery / Delivery
    • exploitation / Exploitation 
    • installation / Installation 
    • command and control (C2) / Command and control (C2)
    • action on objectives / Action on objectives
    • types / Types of DDoS attacks
    • challenges / Challenges with current DDoS solutions
    • transforming, with blockchain / How can blockchain transform DDoS protection?
  • Distributed Ledger Technologies (DLT) / Architecture and core components
  • DNS-based flooding / DNS flooding 
  • DNS architecture
    • master DNS zone / Architecture
    • slave DNS zone / Architecture
    • Aggregate Caching Forwarder (ACF) / Architecture
  • DNSChain
    • about / Blockchain-based DNS solution
    • URL / Lab on Ethereum-based secure DNS infrastructure
    • installing / Installing DNSChain
  • DNS Operations, Analysis, and Research Center (DNS-OARC) / Architecture
  • DNS spoofing
    • DNS cache poisoning / DNS spoofing 
    • DNS server, compromising / DNS spoofing 
    • Man-in-the-middle (MITM) attack / DNS spoofing 
  • Domain Certificate Policies (DCPs) / Testing
  • DomainKeys Identified Mail (DKIM) / DNS
  • Domain Name System (DNS)
    • about / DNS
    • anti-spam / DNS
    • load sharing / DNS
    • privacy / DNS
    • components / Understanding DNS components
    • structure / DNS structure and hierarchy 
    • hierarchy / DNS structure and hierarchy 
    • root name server / Root name server
    • TLD structure / Current TLD structure
    • registries / Registries, registrars, and registrants
    • registrars / Registries, registrars, and registrants
    • registrants / Registries, registrars, and registrants
    • records / DNS records
    • architecture / Architecture
    • challenges / Challenges with current DNS 
    • spoofing / DNS spoofing 
  • Dynamic Data Exchange (DDE) / Live attack execution

E

  • Elastic Compute Cloud (EC2) / Internet versus blockchain
  • encrypted HTTP attacks / Encrypted HTTP attacks
  • endpoint detection and response (EDR) / Endpoint detection and response (EDR), The assume breach approach
  • ENISA Threat Landscape (ETL) / Europe
  • Ethereum
    • about / Ethereum, What is Ethereum?
    • history / History
    • Ethereum Classic (ETC) / History
    • Ethereum (ETH) / History
    • smart contract / Smart contract
    • Ethereum Virtual Machine (EVM) / EVM
    • gas / Gas
    • dApp / dApp
    • versus Hyperledger / Bitcoin versus Ethereum versus Hyperledger
  • Ethereum-based secure DNS infrastructure
    • about / Lab on Ethereum-based secure DNS infrastructure
    • lab preparation / Lab preparation
    • namecoin blockchain, installation / Namecoin blockchain installation
    • PowerDNS, installing / Installing PowerDNS
    • DNSChain, installing / Installing DNSChain
  • Ethereum IDE
    • URL / Smart contract
  • Ethereum Virtual Machine (EVM) / What is Ethereum?, EVM, Architecture and core components
  • European Union agency for Network and Information Security (ENISA) / Europe

F

  • flooding attacks
    • User datagram protocol (UDP) flood / User datagram protocol (UDP) flood
    • ICMP flood / ICMP flood
    • Internet Group Management Protocol (IGMP) flood / Internet Group Management Protocol (IGMP) flood
    • amplification attacks / Amplification attacks
  • foundation layer
    • evolution / Evolution at the foundation layer

G

  • gas / Gas
  • General Data Protection Regulation (GDPR)
    • about / Europe, Challenges with blockchain
    • URL / Europe
  • General Public License (GPL) / Installing PowerDNS
  • generic top-level-domain (gTLD) / Registries, registrars, and registrants
  • Gladius project
    • URL / Lab
  • government
    • about / Governments
    • United States (US) / The United States (US)
    • United Kingdom (UK) / The United Kingdom (UK)
    • Europe / Europe
    • India / India

H

  • hardware security modules (HSMs) / Challenges of the existing PKI model
  • Hash-based Message Authentication Code (HMAC) / Cryptography – digital signature and hashing algorithm
  • High Orbit Ion Cannon (HOIC) / Weaponization
  • hping / Weaponization
  • Hyperledger
    • overview / Hyperledger overview
    • community-driven infrastructure / Program goal
    • enterprise-grade framework / Program goal
    • technical communities, building / Program goal
    • awareness / Program goal
    • building blocks / Architecture and core components
    • Iroha / Architecture and core components
    • Sawtooth / Architecture and core components
    • Indy / Architecture and core components
    • burrow / Architecture and core components
  • Hyperledger Fabric encryption literary / Achieving confidentiality with Hyperledger Fabric
  • Hyperledger Fabric model
    • about / Hyperledger Fabric model
    • core components / Hyperledeger Fabric core components
    • nodes / Hyperledeger Fabric core components
    • ledger / Hyperledeger Fabric core components
    • channel / Hyperledeger Fabric core components
    • world state / Hyperledeger Fabric core components
    • chaincode / Hyperledeger Fabric core components
    • consensus / Hyperledeger Fabric core components
    • working / Workings of Hyperledger and transaction processing
    • transaction processing / Workings of Hyperledger and transaction processing
    • capabilities / Hyperledger Fabric capabilities
    • confidentiality, achieving / Achieving confidentiality with Hyperledger Fabric

I

  • IBM model / Decision path for blockchain
  • indicator of compromise (IOC) / Cyber threat intelligence (CTI)
  • information security (infosec) team / What is the CIA security triad?
  • insider threats
    • about / Insider threats
    • defining / Some more ways to define insider threats
    • profile / Insider threat profile
  • integrity
    • about / Blockchain on integrity
    • using, in blockchain network / Integrity in the current blockchain network
    • block arrangement / Block arrangement and immutability
    • immutability / Block arrangement and immutability
    • achieving, with Hyperledger / Achieving integrity with Hyperledger
    • chain, verifying / Verifying chain integrity
  • International Standard Organization (ISO) / Internet versus blockchain
  • internet
    • versus blockchain / Internet versus blockchain
    • IP packet, versus block / IP packet versus block
    • web app, versus dApp / Web app versus dApp
  • Internet Assigned Numbers Authority (IANA) / Current TLD structure
  • Internet Control Message Protocol (ICMP) / User datagram protocol (UDP) flood, ICMP flood
  • Internet Corporation for Assigned Names and Numbers (ICANN) / Challenges of the existing PKI model, Current TLD structure
  • Internet Group Management Protocol (IGMP) flood / Internet Group Management Protocol (IGMP) flood
  • Internet Service Provider (ISP) / DNS
  • Internet Systems Consortium (ISC) / Architecture
  • intrusion prevention system (IPS) / Data breaches, Reconnaissance
  • IP header / IP packet versus block

J

  • Jester / From script kiddies to geopolitical

K

  • Karl Wust and Arthur Gervais model / Decision path for blockchain
  • key
    • using / Certificate life cycle
    • processing / Certificate life cycle
  • Key Management Interoperability Protocol (KMIP) / Key management

L

  • lab, 2FA
    • about / Lab
    • components / Components
    • praparation / Preparation
    • Node.js, installing / Installing Node.js
    • Ethereum, turning up / Turning up Ethereum
    • smart contract, turning up / Turning up the smart contract
    • verification / Testing and verification
    • testing / Testing and verification
  • lab environment
    • executing / Lab
    • tuna application / Tuna application
  • Lightweight Directory Access Protocol (LDAP) / PKI in a nutshell
  • live attack execution / Live attack execution
  • Low Orbit Ion Cannon (LOIC) / Weaponization

M

  • mail exchanger (MX) / DNS records
  • man-in-the-middle (MITM) attacks / Business adaptation, PKI
  • managed security service (MSS) / The assume breach approach
  • master DNS zone / Architecture
  • Membership Service Provider (MSP) / Hyperledeger Fabric core components
  • miner / How blockchain works
  • multi-factor authentication (MFA) / Evolution of user authentication

N

  • name server (NS)
    • about / Name servers, Root name server, DNS records
    • authoritative name server / Name servers
    • caching name server / Name servers
  • namespace / Namespace
  • National Institute of Standards and Technology (NIST) / Certificate life cycle
  • National Insurance Number (NINO) / Cryptography – digital signature and hashing algorithm
  • National Registration Identity Card (NRIC) / Cryptography – digital signature and hashing algorithm
  • nclay / Notable recent data breaches
  • network topology / DNS topology for large enterprises
  • nodes / Block
  • NotPetya /

O

  • on-premise solution / How does it work?
  • one-time password (OTP) / Evolution of user authentication
  • Open Systems Interconnection (OSI) / Internet versus blockchain
  • Organization for the Advancement of Structured Information Standards (OASIS) / Key management

P

  • payload / IP packet versus block
  • permissioned blockchain / When should you use blockchain?
  • personal identification number (PIN) / What is 2FA?
  • pin-sha256 / MITM-proof DNS infrastructure
  • pointer (PTR) / DNS records
  • point of sale (POS) / Notable recent data breaches
  • Ponemon Institute report
    • URL / Impact of data breaches
  • PowerDNS
    • installing / Installing PowerDNS
  • Practical Byzantine Fault Tolerance (PBFT) / How blockchain works
  • private blockchain
    • versus public blockchain / Private versus public blockchain
    • about / Private blockchain
  • Proof-of-Stake (PoS) / How blockchain works, When should you use blockchain?
  • Proof-of-Work (PoW) / How blockchain works, When should you use blockchain?
  • Proof of Elapsed Time (PoET) / Architecture and core components
  • public blockchain / Public blockchain
  • public key infrastructure (PKI)
    • about / PKI, PKI in a nutshell, Blockchain-based DNS solution
    • evolution / The evolution of PKI
    • components / Components
    • architecture / Architecture
    • certificate life cycle / Certificate life cycle
    • key management / Key management
    • challenges / Challenges of the existing PKI model
    • blockchain, using / How can blockchain help?
    • decentralized infrastructure / Decentralized infrastructure
    • deployment method / Deployment method
    • prerequisites / Requirements 

R

  • ransomware
    • about / Ransomware
    • Ransomware-as-a-service (RaaS) / The monetization of hacking 
    • WannaCry /
    • SimpleLocker / SimpleLocker
    • TeslaCrypt / TeslaCrypt
    • CryptoLocker / CryptoLocker
    • PC Cyborg / PC Cyborg
  • Ransomware-as-a-service (RaaS) / The monetization of hacking 
  • Reaction Policies (RP) / Testing
  • reconnaissance / Live attack execution, Reconnaissance
  • records / DNS records
  • registrant / Registries, registrars, and registrants
  • registrar / Registries, registrars, and registrants
  • Registration authority (RA) / Registration authority (RA)
  • registry / Registries, registrars, and registrants
  • Relative Attack Surface Quotient (RASQ) / The security ecosystem 
  • remote procedure call (RPC) / Delivery
  • Reset (RST) / TCP RST attack
  • root name server / Root name server
  • RSnake / Weaponization

S

  • salve DNS zone / Architecture
  • secret key / Asymmetric key encryption
  • Secure File Transfer Protocol (SFTP) / DNS records
  • secure sockets layer (SSL) based attack / Secure sockets layer (SSL)-based attack
  • security challenges / Emerging security challenges
  • security information and event management (SIEM) / The assume breach approach
  • Sender Policy Framework (SPF) / DNS
  • server resources
    • targeting / Attacks targeting server resources
    • TCP SYN flood / TCP SYN Flood
    • TCP RST attack / TCP RST attack
    • secure sockets layer (SSL) based attack / Secure sockets layer (SSL)-based attack
    • encrypted HTTP attacks / Encrypted HTTP attacks
  • SFA / Evolution of user authentication
  • SHA-256 algorithm
    • URL / Cryptography – digital signature and hashing algorithm
  • Shadow Brokers /
  • SimpleLocker / SimpleLocker
  • Simplified Byzantine Fault Tolerance (SBFT) / Workings of Hyperledger and transaction processing
  • single-factor authentication (SFA) / Evolution of user authentication
  • slowloris / Weaponization
  • small office home office (SOHO) / Architecture
  • social security number (SSN) / Notable recent data breaches, Cryptography – digital signature and hashing algorithm
  • Start of Authority (SOA) / DNS records
  • symmetric encryption / Asymmetric key encryption

T

  • TCP RST attack / TCP RST attack
  • TCP SYN flood / TCP SYN Flood
  • techniques, tactics, and procedures (TTPs) analysis / The security ecosystem 
  • TeslaCrypt / TeslaCrypt
  • text (TXT) / DNS records
  • threat landscape
    • about / Current threat landscape
    • ransomware / Ransomware
    • Distributed denial-of-service (DDoS) attacks / Distributed denial-of-service (DDoS) attacks
    • insider threats / Insider threats
    • data breaches / Data breaches
    • advanced persistence threat (APT) / Advanced persistence threat (APT)
  • tools, DDoS attacks
    • Low Orbit Ion Cannon (LOIC) / Weaponization
    • High Orbit Ion Cannon (HOIC) / Weaponization
    • hping / Weaponization
    • slowloris / Weaponization
  • top-level domains (TLDs) / Ransomware, Resolver
  • Tor / Ransomware
  • Tovar / CryptoLocker
  • Trivial File Transfer Protocol (TFTP) / Delivery
  • trusted third party (TTP) / PKI in a nutshell
  • tuna application
    • about / Tuna application
    • aim / Tuna application
    • installation / Tuna application
    • troubleshooting / Tuna application
    • verification / Tuna application
    • implementing / Tuna application
  • Two-factor authentication (2FA)
    • about / What is 2FA?, Evolution of user authentication
    • user authentication, evolution / Evolution of user authentication
    • benefits / Why 2FA?
    • working / How does it work?
    • cloud-based solution / How does it work?
    • on-premise solution / How does it work?
    • challenges / Challenges
    • using, in blockchain / Blockchain for 2FA
    • blockchain, using / How can blockchain transform 2FA?
    • solution architecture / Solution architecture
    • lab / Lab
  • types, DDoS attacks
    • network resources, targeting / Attacks targeting network resources
    • server resources, targeting / Attacks targeting server resources
    • application resources, targeting / Attacks targeting application resources

U

  • UK NCSS program
    • URL / The United Kingdom (UK)
  • use cases, blockchain
    • FinTech / Business adaptation
    • Healthcare / Business adaptation
    • cyber security / Business adaptation
  • User datagram protocol (UDP) flood / User datagram protocol (UDP) flood

V

  • Verisign / Registries, registrars, and registrants
  • virtual private network (VPN) / Live attack execution

W

  • WannaCry /
  • weaponization / Live attack execution, Weaponization
  • web app
    • versus dApp / Web app versus dApp

Z

  • zero-trust approach
    • about / The zero-trust approach
    • sensitive data, identifying / The zero-trust approach
    • sensitive data, classifying / The zero-trust approach
    • data-flow, mapping / The zero-trust approach
    • network architect / The zero-trust approach
    • policy base, creating / The zero-trust approach
    • continuous monitoring / The zero-trust approach
lock icon The rest of the chapter is locked
arrow left Previous Section
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}