{"id":50299,"date":"2020-06-05T00:00:00","date_gmt":"2020-06-05T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/do-you-fear-blockchain-5-cybersecurity-benefits\/"},"modified":"2020-06-05T01:28:10","modified_gmt":"2020-06-05T01:28:10","slug":"do-you-fear-blockchain-5-cybersecurity-benefits","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/do-you-fear-blockchain-5-cybersecurity-benefits\/2\/34109","title":{"rendered":"Do You Fear Blockchain? 5 Cybersecurity Benefits"},"content":{"rendered":"
In simple words, blockchain<\/a> is defined as a shared and immutable ledger that allows users to record transactions and track assets.<\/p>\n It's widely regarded as a disruptive technology that revolutionized the financial industry due to its use for creation of cryptocurrencies<\/a> (e.g., Bitcoin<\/a> and Ether) and launching initial coin offerings<\/a> (ICOs).<\/p>\n The application of blockchain technologies in the field of cybersecurity<\/a> is generally less known, but not less promising, either.<\/p>\n Blockchain technologies can be used for the creation of applications allowing their users to store data in a decentralized manner. More specifically, the data to be stored is broken apart and stored in a large number of nodes.<\/p>\n The process of dividing the data in such a way is also known as sharding<\/a>.<\/p>\n Thus, if one of the data blocks is compromised, the other blocks will remain secure and protected. If each piece of data is copied on several data blocks, no data will be permanently lost even if a given data block is compromised.<\/p>\n Sia is an example<\/a> of an application for decentralized data storage. It divides files into 30 segments before uploading each of them to hosts located all over the world.<\/p>\n Sia uses the technology Reed-Solomon erasure coding to divide the files in such a manner that any 10 of 30 segments are able to fully recover the stored content. As a result, if 20 out of 30 segments are lost, the stored data will still be retrieved in its entirety.<\/p>\n Distributed denial-of-service (DDoS) attacks<\/a> are attacks aiming to disrupt normal traffic of a network, service, or a server by overwhelming the target with Internet traffic.<\/p>\n DDoS attacks<\/a> rely on the fact that the target constitutes a single point of receiving information that can be easily overburdened if flooded by a large number of points sending information. Blockchain technologies can eliminate the need for a centralized server.<\/p>\n Hackers willing to use DDoS attacks against a decentralized network need to disperse the attack traffic. This, in turn, will significantly decrease the success rate of their DDoS attacks.<\/p>\n Marketing research indicates that the number of IoT<\/a> connected devices will grow from 27 billion in 2017 to 125 billion in 2030.<\/p>\n This means that hackers will have more opportunities to conduct attacks on IoT technologies. Such attacks can be particularly harmful as the attack on one IoT device may allow hackers to control an entire set of interconnected IoT devices.<\/p>\n For example, if a hacker gains control over the entire IoT network of a household, they may be able to remotely stop the refrigerator of the family, unlock the door, and turn on the heater.<\/p>\n Blockchain technologies can be used to decentralize the control over a network of IoT devices. This in turn will prevent hackers from taking over the entire network through an attack on its controlling authority.<\/p>\n The use of passwords is commonly used method for confirming identity of users. One of the main drawbacks of passwords is that they are stored on a centralized system.<\/p>\n Thus, even very strong passwords may become ineffective if the system on which they are stored is compromised. Blockchain technologies enable the creation of decentralized digital identities which are not dependent on a single third party.<\/p>\n For example, LegallyChained.com<\/a> allows its users to create a blockchain-based private identity while at the same time securing their privacy.<\/p>\n Private messaging applications are used every day by millions of users. Skype alone has 300 million monthly users<\/a>. <\/span><\/p>\n WhatsApp has more than 1.5 billion active users<\/a>.<\/p>\n Although many users believe that most of the current private messaging applications are sufficiently secure, this is far from true.<\/p>\n For example, numerous online sources announced that human contractors review audio recordings of Skype conversations<\/a> without obtaining the permission of the participants in the conversations.<\/p>\nA Summary of 5 Cybersecurity Benefits of Blockchain<\/span><\/h2>\n
\n
Decentralized data storage.<\/span><\/h2>\n<\/li>\n
Providing protection against DDoS attacks.<\/span><\/h2>\n<\/li>\n
Enhancing the security of Internet of Things (IoT) technologies.<\/span><\/h2>\n<\/li>\n
Enabling the use of digital identities.<\/span><\/h2>\n<\/li>\n
Securing private messaging applications.<\/span><\/h2>\n<\/li>\n<\/ol>\n
Decentralized Data Storage<\/span><\/h2>\n
Blockchain Provides Protection Against DDoS Attacks<\/span><\/h2>\n
Enhancing the Security of Internet of Things (IoT) Technologies<\/span><\/h2>\n
Enabling the Use of Digital Identities<\/span><\/h2>\n
Securing Private Messaging Applications<\/span><\/h2>\n