A.J. Bahou, LLM, MSECE Bahou Miller PLLC

Similar documents
Surface Web/Deep Web/Dark Web

EVERYTHING YOU NEED TO KNOW ABOUT DIGITAL LEDGER TECHNOLOGY, THE BLOCKCHAIN AND CRYPTOCURRENCIESÓ (Part I June 2018)

arxiv: v1 [q-fin.gn] 6 Dec 2016

Blockchain Technology: Concepts. Whitepaper 1

DEMYSTIFYING BLOCKCHAIN: FROM CRYPTOCURRENCY TO SMART CONTRACTS

Blockchain: Where are We and Where are We Heading?

CSCI 1800 Cybersecurity and International Relations. Bitcoins and Blockchains John E. Savage

L3. Blockchains and Cryptocurrencies

an introduction to Blockchain Technology

Practical Blockchain: Navigating Through The Hall of Mirrors. Sandy Carielli Director of Security Technologies Entrust Datacard

Blockchain made Simple

THE BLOCKCHAIN DISRUPTION. INSIGHT REPORT on Blockchain prepared by The Burnie Group

Blockchain / Distributed Ledger Technology

Alexandros Fragkiadakis, FORTH-ICS, Greece

Private Wealth Management. Understanding Blockchain as a Potential Disruptor

Cybersecurity Tech Basics: Blockchain Technology Cyber Risks and Issues: Overview

The Blockchain Litmus Test

INTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, Javier Prieto IoT Digital Innovation Hub

Blockchain: The New Line of Defense

White Paper. Bizanc Blockchain

Blockchain and Bitcoin: Impact on Insurance Industry

Table of contents. 2

Blockchain Demystified

BLOCKCHAIN: INCREASING TRANSPARENCY IN MEDIA & ADVERTISING. Jessica B. Lee, Partner, Advanced Media and Technology

Blockchain Technology in Banking and Financial Services

Blockchains as a Component of the Next Generation Internet

Technical Line. A holder s accounting for cryptocurrencies. What you need to know. Overview

IEW. OINT OF NOTHER ROM BLOCKCHAIN 101 // EXECUTIVE DECK. Marcelo T. de Alvear 405 Oficina # 9 Ciudad de Buenos Aires Argentina

Blockchain for Education & Research Webinar. December 6, 2016

Introduction to Blockchain Technology

Blockchains. How crypto-currencies work. Luke Anderson. 19th May University Of Sydney.

Blockchain and Smart Contracts: Relevance of Security Facts and Myths to Industrial Control

Cryptocurrencies (Session I) Computer Science and Law

Bitcoin Currency & Blockchain Technology

DeMarche Putting Research To Work Page 1

TOKEN SWAP AGREEMENT DATAVLT is a proud product of XYPHER Pte. Ltd. Token Swap: Explanatory Note & Terms and Conditions

Blockchain-based Traceability in Agri-Food Supply Chain Management: A practical Implementation

NEOGOLD whitepaper NEOGOLD NEOGOLD

Will Bitcoin and the Block Chain change the way we Live and Work? Martyn Thomas CBE FREng Livery Company Professor of Information Technology

THE FUTURE OF BLOCKCHAIN WITH IOT. Ama Asare

The Abjcoin white paper Nigeria s blockchain solution for global payment

Blockchain in Insurance: An Introduction

Monetary Policy and Payments

Blockchain Technology

LinkedIn /in/petkanic/

Healthcare, Blockchain and Smart Contracts: Emerging Issues for Healthcare Counsel

The Blockchain Identity

WIZBL WHITE PAPER 5th Generation of Blockchain Technology. v 0.8 content subject to change 2018 WIZBL. All rights reserved.

Blockchain 2.0: Smart Contracts

What Blockchain Means For Your Organization s Insurance Program

November 2018 Abstract

CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY...

chainfrog WHAT ARE SMART CONTRACTS?

DEx.top Technical White Paper (V1.0)

CREDITS. A New Blockchain Generation

Cisco Live /11/2016

BLOCKCHAIN/CRYPTOCURRENCIES AND CYBERSECURITY, THREATS AND OPPORTUNITIES

Understanding Blockchain & its implications for financial professionals

Block chain Technology:Concept of Digital Economics

Will Blockchain Change the Audit? Zhiyong Li. Jianghan University, Wuhan, China. Introduction. The Blockchain Technology

Blockchain Technology for Next Generation ICT

Lecture 23 Cryptocurrency. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller s ECE 422

Cryptocurrency and Blockchain Technology

Blockchain Developer TERM 1: FUNDAMENTALS. Blockchain Fundamentals. Project 1: Create Your Identity on Bitcoin Core. Become a blockchain developer

Introduction. No Offer

Boon Coin Terms and Conditions

For insurers Blockchain is the new black

A Technology Revolution

Blockchain 101. Featuring: MNP & The CSE Date: December 4, 2018

Whitepaper EXOSIS.ORG

MAVRO Token ( MVR ) Sale Token Sale Agreement

Alethena. 14 May Abstract

How Blockchain Can Help Secure Connected Devices

The Blockchain Trevor Hyde

Blockchain and Law - the Perspective - SANG YONG LEE CHUNGNAM NATIONAL UNIVERSITY LAW SCHOOL

Patent Strategies for Cryptocurrencies and Blockchain Technology

WHITEPAPER BLOCKCHAIN DEPLOYMENT & ICO MANAGEMENT

RISK FACTORS: SIMPLE AGREEMENT FOR FUTURE TOKENS ( SAFT )

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Poipa. April 24, 2018

BITCOINS and CRYPTOCURRENCIES How It Works. Principal Consultant CISA, CISSP

The BitShares Blockchain

Blockchain & Bitcoin. Länsstyrelserna David Bauman

Blockchain & The Hollywood Supply Chain

The DEX Primer: A Novel Approach to Supplanting Traditional Financial Markets

TECHNICAL WHITEPAPER. Your Commercial Real Estate Business on the Blockchain. realestatedoc.io

whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion

How Blockchain Technology Changes Marketing

WHO NEEDS THE BLOCKCHAIN AND WHY? (OR WHY NOT) David V. Croft

Investing in the Blockchain Ecosystem

New Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow

Crypto-assets and crypto-businesses a regulatory and legal issues

Blockchain in Healthcare

Blockchain. Deepak Agarwal ICMA Conference Presenter

Blockchain Technology. State Legislative Update July 2018

Quality Assurance in Blockchain

Distributed Ledger Technology

SMART CONTRACTS in Insurance

Computer Security. 13. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2018

Blockchain Series Part 1 of 4:

Paolo Caniccio. A Blockchain solution for European SMEs

Transcription:

A.J. Bahou, LLM, MSECE Bahou Miller PLLC AJBahou@BahouMiller.com ISACA and ISC2 December 2017 The views expressed herein are solely the presenter s and do not necessarily reflect any position of Bahou Miller PLLC or its clients. 1

2

3

4

Agenda Introduction What is Blockchain? Why does it matter? Components Cryptography Terms - Blocks, Tokens, Hashes, Immutable How will Blockchain affect Information Security, Cybersecurity, and Compliance? Do we need to look for new jobs? Prior Hacks How to protect information on the Blockchain? 5

Attorney Disclaimer This is merely an introduction & terminology is used in various ways (focus on concepts as we begin). My apologies in advance, but if I say I can t answer. It might be because we have Clients with Patent Applications Clients with Business Models that are not ready for disclosure yet. 6

What is Blockchain? Cryptographic Distributed Ledger A blockchain is a distributed public database that keeps a permanent record of digital transactions. Most often associated with Bitcoin or Cryptocurrency Promise to consider 7

Why does Blockchain matter? This technology could change everything like Electricity Transistor Internet No central authority (in theory) Is consensus good enough? Will the consensus always make the right decision? 8

Cryptography & Security Basics Alice Charlie Bob Eve 9

Cryptography Process of converting ordinary information (plaintext) into encrypted unintelligible text (ciphertext). Encryption 10

Public Key Infrastructure PKI https://en.wikipedia.org/wiki/public-key_cryptography 11

PKI Alice Charlie Bob Eve https://en.wikipedia.org/wiki/public-key_cryptography 12

Public Key Infrastructure PKI https://en.wikipedia.org/wiki/public-key_cryptography 13

PKI Advanced Variation Diffie-Hellman Key Exchange https://en.wikipedia.org/wiki/public-key_cryptography 14

Hashing Hashing is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash function) which is designed to also be a one-way function, that is, a function which is infeasible to invert. https://en.wikipedia.org/wiki/cryptographic_hash_function 15

Hashing https://www.youtube.com/watch?v=_160omzbly8 16

Creating the Chain https://www.youtube.com/watch?v=_160omzbly8 17

18

Blockchain Satoshi Nakamoto Whitepaper, Oct. 31, 2008 19

Example https://hackernoon.com/bitcoin-ethereum-blockchain-tokens-icos-why-shouldanyone-care-890b868cec06 20

Terms Blocks files that contain permanently recorded transaction data Hashes algorithm that maps data to a fixed size Tokens can represent any fungible tradable good Nonce an arbitrary number that may only be used once 21

Terms Immutable unchanging over time or unable to change Distributed copied on various nodes throughout the network Ledger collection of transactions Nodes computer connected to the network that performs the task of validating and relaying transactions 22

How will Blockchain Affect Information Security, Cybersecurity, and Compliance? 23

Identity Management Using Blockchain 24

Is Blockchain Secure? 25

Prior Hacks Related to Blockchain Mt. Gox June 2011 - $8 million stolen (admin pw) Feb. 2014 - $460 million stolen (attack on the hot wallet) Issues No version control Bug fixes delayed Untested code deployed https://www.rsaconference.com/writable/presentations/file_upload/fon4-t11_hacking_blockchain.pdf 26

Hacks Related to Blockchain The DAO (Distributed Autonomous Organization) $50 million hack DAO smart contract flaw known since May 2016 Hacker used flaw that allowed splits inside splits, moving Ether repeatedly without checking the balance Hard fork resulted https://www.rsaconference.com/writable/presentations/file_upload/fon4-t11_hacking_blockchain.pdf https://www.deepdotweb.com/2016/10/06/cryptocurrency-hacks-biggest-heists-blockchain-history/ 27

Compare to Traditional Banking Deposit made, balance updated, but can t always use funds. What is comparison with exchanging cryptocurrency? No FDIC 28

Hacks Related to Blockchain 51% Attack This is often considered as an inherent setback of public blockchains. In a Bitcoin blockchain, the one who has contributed the maximum to the network s mining hashrate has the ability to manipulate the ledger as per his convenience. This is the most common type of attack because of the openness of the distributed ledger technology. Such attack, if executed, costs very very high on the participants (or nodes) of the blockchain. https://itsblockchain.com/2017/01/09/can-blockchain-be-hacked/ 29

Hacks Related to Blockchain Eclipse Attack This involves crippling of one of the nodes in such a way that it fails to interact with other nodes. https://itsblockchain.com/2017/01/09/can-blockchain-be-hacked/ 30

How do we as InfoSec professionals need to protect information on the Blockchain? 31

Industries to Consider Banking & Finance Supply Chain Management Networking and IoT Voting Health Care Online Music Crowd Funding Cybersecurity Government Insurance Charity Energy Management Real Estate Forecasting 32

33

Applications of Blockchain in Cybersecurity 3 Ways Blockchain Is Revolutionizing Cybersecurity, Forbes, Aug. 21, 2017 REMME is making passwords obsolete REMME leverages a distributed public key infrastructure to authenticate users and devices. Instead of a password, REMME gives each device a specific SSL certificate. Blockchain takes the responsibility for strong authentication, resolving the single point of attack at the same time. In addition, the decentralized network helps us to provide consensus between parties for their identification. 34

Applications of Blockchain in Cybersecurity 3 Ways Blockchain Is Revolutionizing Cybersecurity, Forbes, Aug. 21, 2017 REMME is making passwords obsolete The certificate data is managed on the Blockchain, which makes it virtually impossible for malicious hackers to use fake certificates. The platform also uses two-factor authentication to further enhance security for its users. 35

Applications of Blockchain in Cybersecurity 3 Ways Blockchain Is Revolutionizing Cybersecurity, Forbes, Aug. 21, 2017 Obsidian ensures the privacy and security of chats Distributed network cannot be easily censored or controlled by a single source. Meta-data that is distributed reduces the risk of surveillance Increases privacy by using alternative identities, instead of email address or telephone numbers. 36

Applications of Blockchain in Cybersecurity Lockheed Martin bets on Blockchain for Cybersecurity, Cnet May 2, 2017 Using Guardtime Federal Blockchain Security Software Guardtime uses blockchains to create a Keyless Signature Infrastructure (KSI) "These new cyber security approaches will enhance data integrity, speed problem discovery and mitigation," said Ron Bessire, Lockheed Martin's Engineering and Technology vice president. 37

Resources Webpages Bitcoin.com Blockchain.info Insight.Bitpay.com Ethereum.org/ 38

https://blockchain.info/tree/155502176 39

https://blockchain.info/tree/155502176 40

Conclusions Blockchain will disrupt many industries, including cybersecurity. Potential Applications may allow better information systems governance, security, audit, and assurance via execution of smart contracts. Cybersecurity jobs are safe just be ready to protect the Blockchain. (rise above the hype) 41

Questions? Contact info: A.J. Bahou AJBahou@BahouMiller.com Bahou Law, PLLC 42