Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

9/5/2018
08:00 PM

7 Ways Blockchain is Being Used for Security

Blockchain is being used as a security tool. If you haven't thought about adopting it, you might want to reconsider your take.
3 of 8

Distributed Storage
Threat actors love large databases. Single entities that contain terabytes of information mean that a single successful intrusion can result in thousands, millions, or tens of millions of records being revealed. Using blockchain, data can be stored on a wide variety of systems, with the integrity of each node - and therefore the database as a whole - guaranteed through the ledger calculations.
One of the important features of distributed storage implemented with blockchain is the integrity of the data. Any time data is changed, no matter who does the changing, the edit must be verified by the blockchain. When it becomes more difficult to change data, one aspect of storage security is more easily dealt with.
As with so much of computing in 2018, this distributed data model has particular application in the IoT, where sensors and controllers can generate gigabytes of data. If the data can be stored locally until needed for a specific purpose (rather than constantly pushed down to a centralized server and data farm), demand on the network is reduced in step with the lowered security profile of that central server.
(Image: whiteMocca VIA SHUTTERSTOCK)

Distributed Storage

Threat actors love large databases. Single entities that contain terabytes of information mean that a single successful intrusion can result in thousands, millions, or tens of millions of records being revealed. Using blockchain, data can be stored on a wide variety of systems, with the integrity of each node and therefore the database as a whole guaranteed through the ledger calculations.

One of the important features of distributed storage implemented with blockchain is the integrity of the data. Any time data is changed, no matter who does the changing, the edit must be verified by the blockchain. When it becomes more difficult to change data, one aspect of storage security is more easily dealt with.

As with so much of computing in 2018, this distributed data model has particular application in the IoT, where sensors and controllers can generate gigabytes of data. If the data can be stored locally until needed for a specific purpose (rather than constantly pushed down to a centralized server and data farm), demand on the network is reduced in step with the lowered security profile of that central server.

(Image: whiteMocca VIA SHUTTERSTOCK)

3 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Jesussavesme@1
50%
50%
[email protected],
User Rank: Apprentice
11/6/2018 | 12:16:34 AM
Helpful article
Thanks for your article .really helpms me a lot

https://socialprachar.com/31-10-18-what-is-blockchain-technology/?ref=sudheer
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
CVE-2019-16307
PUBLISHED: 2019-09-14
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKe...
CVE-2019-16294
PUBLISHED: 2019-09-14
SciLexer.dll in Scintilla in Notepad++ (x64) before 7.7 allows remote code execution or denial of service via Unicode characters in a crafted .ml file.
CVE-2019-16309
PUBLISHED: 2019-09-14
FlameCMS 3.3.5 has SQL injection in account/login.php via accountName.