Secure Chains

Abhishek Bhattacharya, Srinivas Mahankali, Gokul B Alex

SKU: 9789389328653

$24.95
Type:
Quantity:

ISBN: 9789389328653
eISBN: 9789389328646
Authors: Abhishek Bhattacharya, Srinivas Mahankali, Gokul B Alex
Rights: Worldwide
Publishing Date: February 2020
Pages: 354
Weight:
Dimension:
Book Type: Paperback
As this decade comes to a closure, we are looking at, what we like to call, an Industry 4.0. This era is expected to see radical changes in the way we work and live, due to huge leaps and advancements with technologies such as Blockchain and Quantum Computing. This calls for the new age workforce to be industry-ready, which essentially means an understanding of the core fields of Cybersecurity, Blockchain, and Quantum Computing is becoming imperative.
This book starts with a primer on the “Essentials of Cybersecurity”. This part allows the reader to get comfortable with the concepts of cybersecurity that are needed to gain a deeper understanding of the concepts to follow. The next part gives a similar primer on the “Essentials of Blockchain”. These two parts at the beginning of the book allow this book to be easily followed by beginners as well. The following parts delve into the concepts, where we see a “Superimposition of Cybersecurity and Blockchain”, and the concepts and situations where we may see and understand amazing problems that systems in the current world face day in and day out. This book puts immense emphasis on helping the reader know about the Standards and Frameworks needed to be put in place to make an organization work seamlessly. Towards the end, a part dedicated to Smart Contract Security, Auditing, and Testing in Blockchain provides knowledge about what is one of the most lucrative career options and has vital importance in the field of Blockchain. Conclusively, the book tries well to make the reader “Industry 4.0-ready”, helping them in traversing through the upcoming decade of significant career options.

Tagline

Understand Cybersecurity fundamentals and protect your Blockchain systems for a scalable and secured automation

Key Features

  • Understand the fundamentals of Cryptography and Cybersecurity and the fundamentals of Blockchain and their role in securing the various facets of automation. Also understand threats to Smart contracts and Blockchain systems.
  • Understand areas where blockchain and cybersecurity superimpose to create amazing problems to solve.
  • A dedicated part of the book on Standards and Frameworks allows you to be industry-ready in information security practices to be followed in an organization.
  • Learn the very lucrative areas of Smart Contract Security, Auditing, and Testing in Blockchain.
  • Finish to build a career in cybersecurity and blockchain by being Industry 4.0 ready.
What Will You Learn
By the end of the book, you should be able to understand the gravity of the concepts involved in technologies like Blockchain and Cybersecurity, with an acute understanding of the areas, such as Quantum Computing, which affect the technologies. You will also know about the tools used in Smart Contract Auditing and Testing in Blockchain. You should be able to make a career in blockchain and associated technologies going forward.

Who This Book is For
This book is meant for everyone who wishes to build a career in blockchain and/or cybersecurity. The book doesn’t assume prior knowledge on any of the topics; hence a beginner from any diverse field might definitely give these technologies a try by reading this book. The book is divided into parts that take the reader seamlessly from beginner concepts to advanced practices prevalent in the industry. No prior programming experience is assumed either. Familiarity with the basic web technologies would help, though it is not mandatory to follow this book.
Preface
Introduction
Why Did We Write This Book?
Part 1. Essentials of Cryptography
  • Introduction
Chapter 1: Cryptography Techniques
  • Introduction
  • Key Length
  • Key Management
  • Algorithmic Principles
  • Usage
Chapter 2: Cryptography Protocols
  • Introduction
  • Basic Components of Cryptographic Protocols
  • Security Applications of Cryptographic Protocols
  • Categories of Cryptographic Protocols
Chapter 3: Algorithms and Modes
  • Introduction
  • Behind the Scene Mathematics
  • Block Ciphers
  • Stream Ciphers
  • One-Way Hash Functions
  • Public-Key Algorithms
  • Symmetric Key Distribution using Symmetric Encryption
  • Symmetric Key Distribution using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure (PKI)
  • Cryptographic Attacks
  • Key-Exchange Algorithms
  • Elliptic Curve Cryptography (ECC)
  • Digital Signatures With Encryption
  • Data Encryption Standard (DES)
  • Secure Hash Algorithm (SHA)
  • Message Digest Algorithms (MD5)
  • Rivest, Shamir, Adleman (RSA)
  • Zero-Knowledge Proofs
  • Elliptical Curve Digital Signature Algorithm (ECDSA)
  • Probabilistic Encryption
  • Quantum Cryptography
Part 2. Essentials of Blockchain
  • Introduction
  • What is Blockchain?
  • The Need for Decentralization
  • Demystifying Disintermediation Principles in Blockchain Architectures
Chapter 4: Introduction: Distributed Consensus & Consensus Mechanisms
  • Proof of Work (PoW)
  • Proof of Stake (PoS)
  • Proof of Elapsed Time (PoET)
  • Byzantine Fault Tolerance (BFT) and Variants
  • Federated Byzantine Agreement
  • Ripple Consensus Protocol Algorithm
  • Stellar Consensus Protocol
  • Delegated Proof of Stake (DPoS)
Chapter 5: Types of Blockchain
  • Public Blockchain
  • Private Blockchain
  • Federated or Permissioned Blockchain
Chapter 6: Key Considerations for Blockchain Implementations
  • Scalability
  • Interoperability
  • Sustainability
  • Contracts
  • Currency
  • Application
Chapter 7 : Strategic Roadmap for Digital Enterprise Adoption
  • Convergence of Principles
  • Legacy of Cypherpunks
  • Digital Enterprise Use Cases
  • Digital Transformation Perspective
  • Decentralized Operating Models
  • Prominent Trust Patterns
  • Major Challenges and Constraints
Chapter 8: Blockchain – The New Generation Tool for Cybersecurity
  • Blockchain with Turin Complete State Machine
  • Private and Consortium/Permissioned Blockchains 
  • Overview of Security Tools in Blockchain
  • Vulnerabilities in Blockchain Security
  • Challenges to the Growth of Blockchain Eco-system
Part 3: The Superimposition of Blockchain and Cybersecurity

Chapter 9: Cyberattack Prevention Strategies
  • Evolution of Security
  • Endpoint Detection and Response (EDR)
  • Deception Technology
  • Cyberthreat Intelligence (CTI)
  • Deploying Blockchain-based DDoS
Chapter 10: Blockchain-based Security Mechanisms
  • Blockchain-based DNS Alternatives
  • Public Key Cryptography
  • PKI Components and Functions
  • Decentralizing the PKI System
  • Deploying Blockchain-based PKI Identity Mechanisms
  • Multi-Factor Authentication with Blockchain
  • Blockchain-based Interaction Model for Security
Chapter 11: Threats for Blockchain systems
  • Cyberthreats with Public and Permissioned Blockchains
  • Major Potential Attacks on Blockchain Networks
Chapter 12: Practical Implementations and Use Cases
  • IBM ADEPT Platform
  • Digital Identity as a Distributed Data Structure
  • Cyber-liability Management: A Connected Car Use Case
  • A Smart Home Security Implementation Use Case
Chapter 13: Security in Popular Public Blockchain Networks
  • Project in Discussion: Corda
    • Point-to-Point TLS-encrypted Communications
    • Security using Notary Trust
    • Pluggable Consensus Mechanism
Chapter 14: Cryptography as a Digital Labor for the Integration of Distributed Finance
  • New Generation Payment Infrastructure Powering Secure Global Finance
    • Libra
    • JP Money
    • Ripple
    • Stellar Lumens
Part 4: Standards and Frameworks

Chapter 15: ISO 27001
  • ISO 27001
    • Introduction
    • Scope
    • Terms and Definitions
    • Structure
    • Information Security Policies
    • Organization of Information Security
    • Human Resource Security
    • Asset Management
    • Access Control
    • Cryptography
    • Physical and Environmental Security
    • Operations Security
    • Communications Security
    • Supplier Relationships
    • Information Security Incident Management
  • Implementation of ISO 27001 in Organizations
Chapter 16:
  • NIST
    • Introduction to NIST and HIPAA
    • HIPAA Security Rule
    • NIST and its role in Information Security
    • A Framework for Managing Risk
    • HIPAA Risk Assessment Requirements
Part 5: Smart Contract Security, Auditing and Testing in Blockchain
Chapter 17: Smart Contract Auditing
  • Why is a Security Audit Necessary
  • Types of Smart Contracts
  • Smart Contract Vulnerabilities and Known Attacks
    • Ownership Attack
    • Re-entrancy Attack
    • Underflow and Overflow Attacks
    • Short Address Attack
    • Storage Injection Vulnerability
  • Risks in ICO Crowdfunding Smart Contracts
  • An Ideal Audit Process
Chapter 18: Testing in Blockchain
  • Blockchain Attacks
    • Network Attacks
    • User Wallet Attacks
    • Transaction Verification Mechanism Attacks
    • Mining Pool Attacks
  • Security Testing Phases in Blockchain
  • Testing Framework
  • Quality Issues in Blockchain
  • Practices and Governing Mechanisms
  • Popular Tools for Testing
Part 6: Blockchain Power Automation for Industry 4.0
Chapter 19: Risks posed by the ‘Smart’ Economy Paradigms 
  • Zigbee Chain Reaction Attack
  • Controlling Drones through Blockchain for Security & Auditing
  • Securing Robots through Blockchain
  • Secured Access and Management of Automobiles using Blockchain

Chapter 20: Summary & Conclusion:

  A Safer and Secure World with Blockchain-based Solutions
Abhishek Bhattacharya has been a 2x Blockchain Entrepreneur and an Advisor with several startups where he primarily looks into Smart Contract Auditing and putting cybersecurity protocols in place. He has been a Department Editor at XRDS for over 4 years, and also contributes to ACM US TPC, which focuses primarily on advising the U.S. Government on cybersecurity and other policies. His first book was on Information Technology back in 2014. He has been a Speaker in Blockchain and a Contributing Author with HackerNoon and CoinTelegraph, among others. He is an Educator with ODEM. He is an Advisor with IIB Council’s Blockchain Advisory Board, which is present across 145 countries.

Srinivas Mahankali is a Principal Consultant (Blockchain) at NISG, India. He previously headed the Blockchain Centre of Excellence at ULTS (ULCCS) group and is the Program Director for Blockchain in Technology and Management at Amity Online. He is Six Sigma Certified, NCFM Level 2 Certified in Capital Markets, and R3 Corda Certified. He has an MBA from the prestigious IIM Bangalore. His earlier book, Blockchain – The Untold Story, ranked as a bestseller on Amazon and was the world’s first book to be translated to Chinese by AI bots.

Gokul B. Alex is an Engineer, Economist and Educator experimenting with emerging and exponential technologies. He loves the creative convergence of programming, philosophy, poetry, psychology, physics with passion and perspectives. He is one of the global 100 Blockchain Experts selected by the LATTICE80 Network. He is a top 20 global thought leader on AI, Analytics, Big Data, Blockchain, Cloud, Cybersecurity, Cryptography, Data Science, Design Thinking, Enterprise Architecture, Quantum Computing and EduTech, FinTech, GovTech, HealthTech as ranked by Thinkers360 Platform. His early affair with Blockchain started with explorations on Bitcoin protocol during his stint with IBM and EY in 2013. He has started working on Bitcoin, Multichain, Eris, and Ripple in 2015. He had set up a Blockchain Educational Network in South India in 2016. He developed the first prototype in Hyperledger 0.4 in 2016. He had quickly moved to Ethereum Stack in 2016. He has set up the largest Hedera Hashgraph Community in India. He started working with ZCash, Monero, and RSK in 2017. He runs the ZCash Kerala Community. He has joined Algorand foundation as the first Ambassador from India fascinated by its cryptography. Fascinated by Blockchain Privacy and Security Models, he joins Elixxir Blockchain Platform Ecosystem known as XX Collective. He is an advisor to numerous Blockchain StartUps and Entrepreneurs across the world.

You may also like

Recently viewed