Block chain startups signal new approaches to data integrity
5 stars based on
48 reviews
Looking for a radical way to bolster all three points of the classic security CIA triad? Lucky for you, there's Bitcoin. Specifically, there are two concepts lurking in the Bitcoin phenomenon that are considerably more important than the currency itself: The direction this scripting capability will take isn't clear yet.
A vericon block explorer bitcoin called Ethereum is well underway with its own programming vericon block explorer bitcoin, Ethereum Script, and a platform for developers to create decentralized applications based on smart vericon block explorer bitcoin without the middleman. Another startup called Counterparty offers peer-to-peer financial tools specifically tied to Bitcoin. When it comes to the Bitcoin block chain, it's already crystal clear that there are big potential wins for security.
If you're aware of Bitcoin, you're familiar with the vericon block explorer bitcoin that so-called Bitcoin miners harness high-speed computational processing power in an effort to solve mathematically difficult problems to secure and verify transactions, and create Bitcoins. Miners earn transaction fees and subsidies -- paid in Bitcoins, of course. A new block is written every ten minutes, extending the chronological block chain, which is shared among nodes on a peer-to-peer network using the Bitcoin protocol.
But it's more complicated and far more elegant than that. The block chain is a vericon block explorer bitcoin of data records -- time-stamped transactions -- stored in a database. The hash of each block beginning with the "Genesis block" is used to link to the next so that there is a single forward pathway through the blocks: This is the "chain.
When a Bitcoin transaction occurs, the previous transaction's hash and the public key of the next owner are digitally signed with the current owner's private encryption key. If you want to transfer your Bitcoin that is, buy somethingyou have to have your secret key. No key, no possession. Once an entry is written into the block chain, it cannot be altered without regenerating the previous blocks. In other words, data can be added to the transactions database, but it cannot be removed.
This prevents double-spending and ensures the vericon block explorer bitcoin linking of the block chain. Therein lies the security angle. If a company were to store its vericon block explorer bitcoin ledger in the Bitcoin block chain, a bad apple in the accounting department would be completely unable to go back without detection and alter previous entries to cook the books. Think of the potential impact on fraud prevention. While it might seem odd to think of storing those kinds of transactions in Bitcoin's block chain, in fact, you can store pretty much any sort of data.
And people have occasionally done so, though admittedly with a bit of a "toying with the system" approach. There's a picture of Nelson Mandela in the block chain, for instance.
There's even a model hacker exploit tip of the hat to Ken Shirriff's blog:. Note that the exploit had to do with a client program called MyWallet, not with the Bitcoin vericon block explorer bitcoin -- one definite issue in the Bitcoin economy is that wallet programs that store private keys have to remain unhacked.
Now, writing to the Bitcoin block chain isn't free. It is actually a little vericon block explorer bitcoin if you start thinking about storing megabytes, so no one's likely to use it for directly storing their logs. But the concept of a decentralized database whose records are "secured" by 10, computers can, of course, be extended to other block chains. A startup called Factom is working this angle. As Peter Kirby, the president of the Austin-based company, put it: Factom is just gearing up, but eventually will let its customers write to a separate block chain that's more suitable for data entries.
Cleverly, however, vericon block explorer bitcoin ties those entries back to the Bitcoin block chain by storing a hash of each new Factom in the next Bitcoin block added to the chain. The hash can be used to verify the time of the Factom transactions and that the Factom block hasn't been tampered with.
There are other startups doing this, too. Storj is beta testing a distributed cloud storage service that uses block chain technology. MetaDisk is a file sync app built atop the Storj block chain infrastructure. BlockCypher is building a cloud block chain platform with APIs that make it easier for developers to build applications based on this technology. There's more than just secure recordkeeping lurking here, however. Digital assets can be controlled just like Bitcoins which are, after all, digital assets themselvesso digital rights management may well wind up with a whole new look and new capabilities such as easily transferring ownership of your music collection -- just try reselling stuff you bought through iTunes.
I can't help but think that there will be direct applications of block chain technology to the security space beyond immutable records. I don't have the killer block chain security app figured out yet, but I'm sure, all the same, that non-fungible developments spinning out of Bitcoin will be fascinating to watch from a security perspective.
Follow him on Twitter: By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Cloud backdoors pose a rising threat to enterprises, according to new research. Expert Ed Moyle explains what a cloud backdoor is Protecting an organization against cloud DDoS attacks doesn't have to be expensive.
Expert Frank Siemons discusses the options The Arista campus switches are an effort by the company to target enterprises with the same set of features used by large data Learn the essentials of how to manage cloud networks, from network architecture to how to store and transmit data to security. Wireless networking is changing at breakneck speeds, but Wi-Fi training isn't keeping up.
Find out why firms must pay more As AI architecture improves and costs decrease, experts say enterprise adoption will go up, spurring yet more innovation and The cloud is growing faster than companies can prepare for cloud computing security threats, a quartet of tech leaders say at a When it comes to protecting online info, one cybersecurity veteran says the role of a CISO is to first incorporate processes that At Vericon block explorer bitcoinCitrix introduced a vericon block explorer bitcoin secure digital vericon block explorer bitcoin that provides users unified access to their virtual desktops Microsoft's latest update to Windows 10 helps IT pros and users alike.
On the user front, Focus Assist can help employees silence Partnerships with major cloud providers help position Red Hat OpenShift as a hybrid cloud management platform that customers vericon block explorer bitcoin Microsoft added multi-master write replication and more granular cost controls to Cosmos DB to cover the broadest number of uses Microsoft continues to reach out to developers with an updated tool to help them configure a DevOps pipeline and connect it to UK providers of critical national infrastructure face hefty fines for cyber security failings from 10 May This article can also be found in the Premium Editorial Download: Malware analysis beyond the sandbox.
There are two concepts lurking in the Bitcoin phenomenon that are considerably more important than the currency itself. This was last published in June Misconfigured cloud storage leaves 1. RNC voter database left open to the public Choosing a threat intelligence platform: Vericon block explorer bitcoin practices and design approaches What advanced security analysis tools are and how they work Load More View All Get started. Bolster your DLP strategy with help from the cloud and CASBs How big data tools and technologies can be protected from risk What advanced security analysis tools are and how they work Finding the right security analytics tools for your enterprise Load More View All Evaluate.
Government cybersecurity problems can teach enterprises what to do What's the best way to protect sensitive information while traveling? Cybersecurity and Applied Mathematics Behavioral threat assessment means real-time threat detection Government cybersecurity problems can teach enterprises what to do Microsoft SQL Server end of life: When's the time to migrate?
Load Vericon block explorer bitcoin View All Problem solve. Add My Comment Vericon block explorer bitcoin. Login Forgot your password? Submit vericon block explorer bitcoin e-mail address below. We'll send you an email containing your password. Your password has been sent to: Please create a username to comment.
Search Cloud Security How a cloud backdoor poses a threat to the enterprise Cloud backdoors pose a rising threat to enterprises, according to new research. How to protect your enterprise Protecting an organization against cloud DDoS attacks doesn't have to be expensive.
Search Networking New Arista campus switches aim to simplify designs The Arista campus switches are an effort by the company to target enterprises with the same set of features used by large data Cloud network management begins with the basics Learn vericon block explorer bitcoin essentials of how to manage cloud networks, from network architecture to how to store and transmit data to security.
The vericon block explorer bitcoin of staying up to date with Wi-Fi training Wireless networking is changing at breakneck speeds, but Wi-Fi training isn't keeping up.
Search CIO Optimizing an artificial intelligence architecture: The race is on As AI architecture improves and vericon block explorer bitcoin decrease, experts say enterprise adoption will go up, spurring yet more innovation and IT pros name users, GDPR as biggest cloud computing security threats The cloud is growing faster than companies can prepare for cloud computing security threats, a quartet of tech leaders say at a Data integrity and confidentiality are 'pillars' of cybersecurity When it comes to protecting online info, one cybersecurity veteran says the role of a CISO is to first incorporate processes that Search Enterprise Desktop Citrix Workspace App holds potential, raises questions At SynergyCitrix introduced a new secure digital workspace that provides users unified vericon block explorer bitcoin to their virtual desktops Search Cloud Computing Red Hat OpenShift tie-ups target hybrid cloud portability Partnerships with major cloud providers help position Red Hat OpenShift as a hybrid cloud management platform that customers hope Azure Cosmos DB flexes joints for multiple data stores Microsoft added multi-master write replication and more granular cost controls to Cosmos DB to cover the broadest number of uses Microsoft showcases Azure DevOps Project enhancements Microsoft continues to reach out to developers with an updated tool to vericon block explorer bitcoin them configure a DevOps pipeline and connect it to How enterprises can cope with digital disruption Red Vericon block explorer bitcoin CEO Jim Whitehurst says enterprises can take a leaf from DevOps and build vericon block explorer bitcoin into their technology infrastructure CNI providers face hefty fines for cyber security failings UK providers of critical national infrastructure face hefty fines for cyber security failings from 10 May