To install StudyMoose App tap and then “Add to Home Screen”
Save to my list
Remove from my list
The major intention of this paper is to discuss about the role of cybersecurity in the field of cryptocurrency, figure out the current threats and vulnerabilities, and the countermeasures to minimize the cyberattacks on them. There is a plethora of cybercrimes happening in the field of cryptocurrencies like Coincheck, Parity, Bitfinex, NiceHash, FacexWorm and CoinDash. In this paper we have provided a detailed description of blockchain security measures of different cryptocurrency and their future scope.
Cryptocurrency is a virtual or digital currency.
It has value like money and can be lent, exchanged or borrowed but it doesn’t have a physical presence. Currencies are value deposits that we can use to buy goods or services and most cryptocurrencies cannot be exchanged for anything other than a cryptocurrency. This currency is not handled by banks or some central authority. The transactions get recorded in a digital public ledger called blockchain. It ensures the transactions occur without any interference. The first crypto currency introduced was Bitcoin, in October 2008. This is believed to be done by a person (or a group of people) called Satoshi Nakamoto.
Many other crypto currencies were launched following the success of bitcoin. There are more than around 1300 crypto currencies present today. All these currencies work using the block chain technology.
Blockchain is a group of blocks where each block signifies a transaction or record of exchange. It is a decentralized, distributed database that maintains a list of transactions. Each block consists of various valid transactions which are hashed and added to the list.
Each transaction includes a timestamp and a link to the previous transaction. Hence, if someone tries to modify a record, a new hash will be produced even if a small change is made as it will not contain the information of the previous records. This method confirms the integrity of the previous block and all the way back to the original one: [1]. A transaction requires two things: a wallet and a private key. A wallet is assigned to an individual, which is basically an address to uniquely identify a user. And this address is public, whereas the private key (i. e. , a string of random numbers) must be kept a secret. Once the transaction is requested, it is broadcast to the blockchain network where it will be verified. After verification and validation, this transaction is added as a block and no changes can be made after that: [2]. What makes this system theoretically tamper proof is the cryptographic fingerprint unique to each block, and a “consensus protocol,” by which the nodes in the network agree on a shared history. The fingerprint i. e. , the hash, takes a lot of computing time and energy to generate initially. It serves as a seal, since altering the block would require generating a new hash. Then whether or not the hash matches its block is verified and after that, the nodes update their respective copies of the blockchain with the new block: [3]. These hashes also serve as links in the blockchain. The major goal of a hash is to convert data of any size in to a string of a fixed size taking an arbitrary amount of input data applying some algorithm and engenders finite amount output. Each block comprises the previous block’s distinctive hash. In case if user want to modify an entry in the ledger retroactively, user must manipulate a new hash not only for the block it’s in but also for every subsequent block. and user have to do this rapidly than the other nodes can add new blocks to the chain. If user have computers that are more significant than the rest of the nodes combined, any blocks one adds will have contention with existing ones, and the other nodes will spontaneously reject the changes. This is what makes the blockchain tamper proof, or “immutable. ”
The risks of fraud and theft has prompted governments to regulate cryptocurrency completely out of existence. South Korea and India have signaled their willingness to outlaw crypto exchanges. Some EU countries have started following strict regulation or blacklisting of crypto markets. Even the EU’s upcoming data privacy regulation, the Global Data Protection Regulation (GDPR), may be incompatible with blockchain’s decentralized structure. China has interestingly fasten down harshly on cryptocurrency and its markets while still indicating its support for blockchain technology. The following three could be the future of cryptocurrency: [9]A. Security Tokens: Security tokens are crypto tokens issued to investors in a sale or ICO for the exchange of their money. Security tokens pays dividends, share profits, pays interest or invests in other tokens or assets to generate profits for the token holders. B. Air Gapped Networks: This is the process of keeping the devices that have wallets and cryptocurrencies details disconnected from the internet. Also called as cold storage, this network is about the safest way to keep your cryptocurrency tokens safe and secure from security breaches. C. Polymath Networks: Polymath network and its idea of creating a security token platform where an individual can hold its token sale for investors are far too unique. The company behind Polymath network is Saint George Barbados-based Software Company which was founded back in 2017. Polymath is the only crypto project which is aiming to create a link between securities and blockchain so as to keep the investments of a crypto trader safe and promote crypto trading by enhancing its security and lowering the risk.
The whole point of using a blockchain is to let people—in particular, people who don’t trust one another—share valuable data in a secure, way. This is possible because blockchains store data using sophisticated math and innovative software rules that are extremely difficult to be manipulated by attackers. But the security of even the best-designed blockchain systems can fail sometimes where the math and software rules come in contact with humans, who are skilled cheaters, in the real world, where things can get messy. But the blockchain technology used by bitcoin is by far the most secure way of transferring or sharing digital currency.
Security Analysis Of Cryptocurrency And Blockchain. (2024, Feb 18). Retrieved from https://studymoose.com/security-analysis-of-cryptocurrency-and-blockchain-essay
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment