How the chain chain technology changes the security industry

.article-content-wrap p {margin-top: 10px; margin-bottom: 18px;}n.article-content-wrap blockquote {npadding: 11px 22px;nmargin: 0 0 22px;nline-height: 28px;nborder-left: 5px solid # ffcd04;}nn

nnnRampage comment: According to experts, the block chain not only in the encrypted currency exchange in a place, can also be used to improve the security solution. If implemented properly, this technology can bring more trust to the enterprise’s security system. This is particularly evident in the supply chain industry, and the higher transparency of the block chain technology will definitely help solve many of the thorny network security issues. But the technology is still in its infancy, so the key is that at this stage do not rush to implement the technology.n
nnTranslation: Clovern
nIf implemented properly, the block chain can bring more trust to the enterprise’s security system.n
nExperts say the block chain is not only a place in the encrypted currency exchange, but also can be used to improve the security solution.n
nAccording to Travis Biehn, a technology strategist at Synopsys, Enterprise Software and Solutions, the block chain is not a “silver bullet” for security, but it is not just a way to record financial transactions, but also to control network communications and Internet of Things (IoT) equipment and supply chain means.n
nThe original block chain was created to promote the trading of virtual currency such as Bitcoin, but at the same time the technology was essentially a decentralized electronic taxonomy system.n
nThere is no central custody system that stores data related to transactions, sources and activities. Instead, the information is distributed across computers around the world (also known as nodes) that carry chain records.n
nBiehn said to ZDNet:n
nn”The decentralized system that can be built using block chains is very exciting and applies to all cybersecurity themes – the area in which the technology has application perspectives lies in solving the problem of hardware supply chain traceability and software supply chain issues. The greater transparency of block-chain technology will definitely help solve many of the thorny network security issues. “n
nnThis is not just a software vulnerability that can lead to security issues, such as data leaks or network damage, and there may be problems in the supply chain.n
nWhen a human error or internal staff manipulates the supply chain information or system, the block chain can automatically share any suspicious activity to solve the problem.n
nWhen all participants are able to know who is doing what they are doing, they can track the lax implementation of the security standards, errors, and insider threats, and is expected to solve the problem before the loss is caused.n
nThe supervisor explained:n
nn”If you think about other ways to achieve this goal, such as sharing a single database, or using the traditional leader-election protocol, any member can change the data store at any time. In identity or supply chain tracking applications, you It is clear that the consumer who does not want the data to be able to or has compromised the participant ‘s personnel to change all the information in the classified book.n
nnSmart contracts can also play a role. These small code blocks are stored on each node of the entire block chain network and forcibly performing those operations that can be performed.n
nWhen the computer connected to the block chain performs these operations, the same result must be achieved. Participants can determine the cause of the event, the person who triggered the event, and the logic associated with it, which stimulates more trust in the contract, the system, and more new to the correctness of the results.n
nBiehn said:n
nn”The block chain platform seems promising for the problems of hardware and software components in the supply chain, as well as identity solutions.”n
nnThe block chain itself can not provide threat detection or threat defense in the form of traditional network security solutions, but this technology does provide the infrastructure for improving the transparency, event tracking, encryption technology and opportunities required for secure sensors and data sharing – and This is what is lacking in some of the security solutions and implementations in the enterprise network.n
nThe point is that we should not be eager to implement this still in the initial stage of the technology – we have no security in the case of bulk use of Internet equipment and the continuous emergence of security issues, understand this point.n
nHowever, in today’s era where trust in the system is critical, we may not be able to see that block chains are integrated into systems that handle sensitive information and financial transactions, or control Internet of Things and mobile devices. But the technology can still provide a reliable infrastructure for suppliers to better maintain control of the enterprise network – who do what the network, and as a means to address the weaknesses in the security agreement.n

Leave a Reply

Your email address will not be published. Required fields are marked *