Nt1310 Unit 3 Assignment 1

Decent Essays
repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3]
In the 2nd section we will go through the introduction of blockchain, In the 3rd Section, we will see how blockchain protects personal data, Enhances Data integrity, Traceability and Non-repudiation, how it mitigates DDOS attack and how virtual machine orchestration security is provided by Blockchain. In the 4th section, we will find out some security issues in blockchains like
…show more content…
The blockchain is prolonged with the aid of every additional block and hence represents a entire ledger of the transaction history. Blocks can be validated by means of the community the use of cryptographic means. In addition to the transactions, each block contains a timestamp, the hash fee of the previous block (“parent”),Hash of the current block and a nonce, which is a random variety for verifying the hash. This idea ensures the integrity of the whole blockchain via to the first block (“genesis block”). Hash values are unique and fraud can be efficiently averted since adjustments of a block in the chain would without delay change the respective hash value. If the majority of nodes in the network agree by means of a consensus mechanism on the validity of transactions in a block and on the validity of the block itself, the block can be brought to the …show more content…
T.-C. L. IUON-CHANG LIN, A Survey of Blockchain Security Issues and Challenges, International Journal of Network Security, 19 (2017), pp. 653-659)

2.2 Structure of Block chain:
Main Data: On basis of which type of area the blockchain technology is implemented, such as, transactions recorded in bank, clearing records if banking sector, contract records if business sector or Real estate sector and IOT Data records[5].
Hash Of current Block: When data is stored on the block, Blockchain uses merkle tree function to generate the hash value of that block. After generating the Hash value, it is stored in the header of that block. This is called hash of the current block. Data can be normal data or transactions executed. Only after the latest data has been added or updated, the Hash value is generated by blockchain[5]
Hash of previous block : suppose block2 generates a hash value than that hash value is stored in the in the previous block i.e block1. And block3’s hash value will be stored in block2 and this process goes on in full blockchain

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Scott and Mia, I am not sure which one of your can help me, but in reconciling our account I have discovered a few issues and have some questions. The swiped amount on the reports provided for the GL reconciliation do not always match the swiped amount. I understand that a vendor can undercharge a charge and swipe a card multiple times, but I did not think they could process cards for more than the total payment amount. For example, in tying out our invoice for 2/28-3/6/2018 I found that the swiped amount ties to our invoice/what was paid out via our account, but the swiped amount is for a different amount than what was issued. In six of the seven instances where the swiped amount was different than the issued amount, the swiped amount…

    • 281 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Thank you Madeline for the response. Also I review the claim for the patient Williams,Elmira DOS 02/29/2016 and I see that the claim missing the authorization number since the patient have as a payer St.Francis Life. Would you please review and add the missing information on claim. Please email back so I can add the authorization number on the original claim that I will Hold in Trizetto.…

    • 66 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Answer 1) Cloud computing enables us to access anything, anytime, anywhere. Say you went to your best friend’s birthday party and you take few pictures and videos. You like those pictures so much that you can’t get enough of looking at them. So you upload those pictures on websites like Facebook or Google drive, Instagram etc. to access them anytime you want.…

    • 959 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Public key infrastructure is divided into four major components; certification authorities, registration authorities, repositories and archives. Certificate authority is used to confirm the identities of parties sending and receiving electronic payments, for example using a personal identification number to authenticate electronically. It issues public key certificate for each identity confirming that the appropriate credentials are used and also issue and process certificate revocation lists which have been revoked. Registration authority is an entity trusted by the certification authority to register for the identity of users to a certificate authority. Repository shows active digital certificates for a certification authority system which is used to provide users to confirm their status.…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Blockchain technology tries to change this regime by using mathematics and cryptography. Blockchain provides an open and decentralized database for every transaction that contains value such as money, goods, real estate, work or even notes and creates a record for each transaction. These transactions can be checked by the entire community. The blockchain provides secure, direct transactions without the need for third parties.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Blockchain is a shared, distributed ledger that facilitates the process of recording transactions and tracking assets in a business network [1]. It is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but can be applied to everything of value. Once the information is entered in Blockchain it cannot be erased, modified or tampered with. Everyone in the network will be able to write data/perform transactions but cannot modify the data. Traditional systems follow either Centralized or Decentralized model – Examples are Banks having single point of control (Centralized) and in some cases Decentralized model – with finite points of control.…

    • 1580 Words
    • 7 Pages
    Great Essays