SlideShare a Scribd company logo
BLOCKCHAIN
Exploring
By: Dr Anupam Tiwari
#GPCSSI2024 11th Batch of Gurugram
Police Cyber Security Internship 2024
CYBER SECURITY
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...

This was my research presentation on SDN in IEEE conference as a first author held in Coimbatore, India

software defined wireless networking (sdwn)openflowstride
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009

The document discusses PCI DSS compliance and data protection options. It provides an overview of the PCI DSS standards for protecting cardholder data and discusses challenges with data protection implementations. The document then summarizes various data protection techniques including encryption, tokenization, hashing, and their tradeoffs in terms of security, transparency, and performance. It also presents case studies of large organizations that have implemented data protection solutions to meet PCI compliance.

pciissadss
Smart Contract Security Testing
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security Testing

Security testing of smart contracts using static and dynamic testing. Blockchain (Ethereum) and smart contract language-related (Solidity) issues. Best practices and assessment frameworks. Tools and future directions.

smart contractsecuritytesting
Secure Network Configuration
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Phishing Prevention
Secure Network Configuration
Data Encryption
Backup and Disaster Recovery
Endpoint protection
Incident response planning
Security policies and procedures
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Antivirus/Antimalware Software
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Security Monitoring and Incident Response
Backup and Disaster Recovery
Endpoint protection
Network monitoring and logging
Incident response planning
Secure virtualization practices
Security policies and procedures SIEM
Security audits and assessments
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF) Network Segmentation
Backup and Disaster Recovery
Endpoint protection
Physical security controls
Network monitoring and logging
Incident response planning
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Security audits and assessments

Recommended for you

TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics

The document discusses Cisco's Encrypted Traffic Analytics (ETA) solution. ETA uses machine learning techniques to analyze metadata from encrypted network traffic and detect malware without decrypting traffic. It can identify malware signatures and anomalous behavior in encrypted web, cloud, and internal traffic. ETA extracts features from packet lengths, times, and byte distributions to build detectors that can find known malware in encrypted traffic with high accuracy. The solution provides visibility, compliance monitoring, and threat detection across an organization's entire network, including campus, branch offices, and the cloud.

ciscotechwisetvencrypted traffic analytics
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics

The document provides an overview of cloud infrastructure architecture and security. It discusses key cloud security concepts like the shared responsibility model between cloud providers and customers. It also covers common cloud security categories such as identity and access management, data security, compliance with regulations, and security best practices and frameworks.

securityforensiccloud
Automating cloud security - Jonny Griffin
Automating cloud security - Jonny GriffinAutomating cloud security - Jonny Griffin
Automating cloud security - Jonny Griffin

On Tuesday, June 22nd Jonny Griffin, Security Engineer at Working Group Two, gave a presentation at a three day conference at GSMA FASG. In the last three years, Working Group Two has been developing a DevSecOps framework to ensure their cloud-native mobile core network is secure. Automating Cloud Security introduces the topics around cloud computing, DevSecOps, cloud-native Security Layers, and how WG2 built a security tool chain that can be leveraged by any organisation. As security is evolving so is WG2's capabilities for identifying, preventing, and responding to security events in our networks.

automating cloud secuityawscloud computing
Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF) Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and logging
Incident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments
Firewalls
Intrusion Detection and Prevention Systems (IDPS)
Unified Threat Management (UTM)
Access Controls
Antivirus/Antimalware Software
Patch Management
Secure Coding Practices
Phishing Prevention
Secure Network Configuration
Data Encryption
Employee Training and Awareness
Security Monitoring and Incident Response
Web Application Firewalls (WAF) Network Segmentation
Backup and Disaster Recovery
Data loss prevention (DLP)
Secure remote access (VPN)
Secure email gateways
Secure password policies
Endpoint protection
Device management
Secure web browsing practices
Physical security controls
Two-factor authentication (2FA)
Network monitoring and logging
Incident response planning
Vulnerability scanning and assessment
Secure file transfer protocols (SFTP)
Secure virtualization practices
Security policies and procedures SIEM
Application white listing
Network segmentation and isolation
Security audits and assessments
CYBER SECURITY
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment

This document proposes a new Multi-Server Authentication Key Exchange approach for secure communication in big data environments. It aims to address issues with the existing Kerberos approach used in Parallel Network File Systems (pNFS), which has scalability limits and does not provide forward secrecy or prevent key escrow. The proposed approach uses authenticated key exchange protocols between clients and storage devices to reduce the workload on the metadata server by up to 54% while providing forward secrecy and preventing key escrow with only minor client-side computation overhead. It is designed specifically for the needs of pNFS but could benefit other similar distributed file systems.

DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK

1. The document proposes decentralizing e-commerce services on the Cardano blockchain network to improve security and anonymity of transactions. 2. E-commerce products and metadata would be uploaded and minted as non-fungible tokens using the Cardano cryptocurrency (ADA) on a web3 prototype site. 3. Transactions would utilize the Cardano blockchain's BLAKE hashing algorithm and proof-of-work consensus to provide greater security compared to other systems relying on SHA hashing which is vulnerable to attacks.

irjet
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies

The document provides an overview of enterprise data protection options and strategies. It discusses the changing threat landscape, including increasingly sophisticated attackers and the need for preventative controls. Regarding payment card industry data security standards (PCI DSS), it notes there are 12 rules and 4 approved ways to render credit card numbers unreadable. A case study is presented of a large retail chain that used tokenization to simplify PCI compliance, achieving benefits like faster audits, lower costs, and better security. Different data security methods like hashing, encryption, and tokenization are compared in terms of how they can be applied at the application, database, and storage levels. Best practices for tokenization and evaluating various approaches are also covered.

Blockchain and Cyber Defense Strategies in new genre times
ONE HUNDRED PERCENT
PROTECTION DOES NOT EXIST
Blockchain and Cyber Defense Strategies in new genre times
MAKE THE PROBLEM
HARDER FOR CRIMINALS
TO BREAK

Recommended for you

Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalDoag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final

This document summarizes a presentation on developing blockchain applications using Hyperledger Fabric. It discusses key Hyperledger Fabric concepts like chaincode, which defines the business logic of a blockchain application. Chaincode is written in languages like Go and JavaScript. It also discusses the Hyperledger Fabric architecture, including components like peers, orderers, and how channels isolate ledgers in the network. The presentation provides examples of querying and updating state databases using chaincode. It demonstrates typical workflows for deploying chaincode to networks like Oracle Autonomous Blockchain Cloud Service.

doag2018blockchainapplication development
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales

The document provides an agenda and overview of CryptTech's log management system called CryptoLOG, as well as their hotspot solution called CryptoSPOT. CryptoLOG allows centralized collection, analysis, correlation and reporting of logs from various sources. It supports numerous collection methods including syslog, agents, shares and databases. CryptoLOG also provides high availability clustering, distributed deployment architectures, and security features like role-based access.

IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org

Blockchain and Cyber Defense Strategies in new genre times
FOR THE
UNversed
WHAT
IS
An Overall View……
BLOCK with
some DATA
BLOCK with
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size

Recommended for you

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org

2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf

The document describes a hardware-assisted approach called Dynamic Information Flow Tracking (DIFT) to provide practical and efficient software security. A flexible hardware design is proposed that works with unmodified binaries to track tainted data from untrusted sources and check for unsafe uses. A key idea is to offload DIFT operations to a separate coprocessor to minimize changes to the main processor core while providing robust, flexible and practical end-to-end security with low overhead. System calls are used as synchronization points between the main core and DIFT coprocessor to prevent exploits while maintaining the DIFT security model. Experiments show the approach can detect various attacks without false positives in real-world applications and unmodified binaries.

hardware
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure

This document summarizes a presentation about blockchain on Azure. It discusses: 1. The four pillars of blockchain - secure, shared, distributed, and ledger. 2. Different types of blockchain networks including public, private, and consortium. 3. Why Microsoft is well-positioned for blockchain with its open ecosystem on Azure. 4. How blockchain is evolving from simple ledgers to incorporating smart contracts and external data access through cryptlets. 5. Examples of blockchain applications including supply chain management and social good projects.

blockchain essentialsblockchainblockchain on azure
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
BLOCK with
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
BLOCK with
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
BLOCK with
some DATA
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
BLOCK with
some DATA

Recommended for you

Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps

1.Security Controls Must Be Programmable and Automated Wherever Possible 2.Implement a Simple Risk and Threat Model for All Applications 3.Scan Custom Code, Applications and APIs 4.Scan for OSS Issues in Development 5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code 6.Measure System Integrity and Ensure Correct Configuration at Load 7.Use Whitelisting on Production Systems, Including Container-Based Implementations 8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response 9.Lock Down Production Infrastructure and Services 10.Tokenization and Payment Processing

information securitysecdevopsintegrate security into devops - secdevops
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet

Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.

ics cybersecuritycyber securityics
Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security

Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.

data sovereigntycyber securitydata integrity
SHA-256 (Hash algorithm)
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
There are 100’s of
algorithms & this is one
TYPE
BLOCK with
some DATA
SHA-256 (Hash algorithm)
6bcec30f359e597986bcdc075eed3e339a3a1
8673ec4624425d75247eacce9f5
HASH
Cryptographic function, a mathematical algorithm
that maps data of arbitrary size to a bit array of a
fixed size
BLOCK with
some DATA
Text input : TALK ON 27 JUN 2024
HASH
HASH
Let this be a sample
TEXT data and be
applied HASH upon
Text input : TALK ON 27 JUN 2024

Recommended for you

Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats

In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent. This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries. Key topics covered include: An overview of quantum computing and its implications for blockchain security. Current cryptographic standards and their vulnerabilities in the face of quantum threats. Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems. Case studies and real-world implications of quantum-resistant blockchain implementations. Strategies for integrating post-quantum cryptography into existing blockchain frameworks. Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.

quantum computingblockchain technologycryptographic standards
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES

The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.

cybercrimescyber lawstallinn manual
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it

his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.

cyber securityprivacysecurity
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH
Always 64
digit output
Text input : TALK ON 27 JUN 2024
58b162269025ef5388e111768847ef995e8831f
5d82a5d22076833ed25b29b95
HASH WATCH HERE
Text input : TALK ON 27 JUn 2024
eb23df9940ebe8ad1ad9ef271e7de5923e7b45
93199ce699f82c9e4986df737b
HASH WATCH HERE

Recommended for you

IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...

While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?

ieteanupam tiwaribitcoin
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges

IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead

iotblockchaindistributed
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals

Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.

bitcoinblockchainproof of work
BLOCK with
some DATA
1
BLOCK with
some DATA
1 2
1 2 3

Recommended for you

BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME

The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.

cryptocurrencycryptographybitcoin
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies

Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.

bitcoinblockchaincryptocurrency
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference

This document discusses Bitcoin and blockchain technology. It begins with an introduction to Bitcoin, including its use as a digital currency and the blockchain network that underlies it. It then provides definitions of key Bitcoin and blockchain terms, such as wallets, addresses, mining, blocks, and hashes. The document also discusses tools and techniques related to Bitcoin forensics, such as analyzing blockchain data and artifacts from seized computers and devices.

anupam tiwaribitcoinblockchain
1 2 3 4
1 2 3 4 5
1 2 3 4 5
6
1 2 3 4 5
7 6

Recommended for you

Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example

This document provides examples to explain the Swirlds hashgraph consensus algorithm. It shows a hashgraph growing over time as members create events and gossip with each other. Each event contains cryptographic hashes linking it to previous events. Rounds are defined, with each member's first event in a round being a "witness." Elections are held for witnesses to determine if they are "famous," with later witnesses counting votes. The goal is for all members to reach consensus on the order and timestamps of all events.

hashgraphblockchaincryptocurrency
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE

Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/

technologybitcoincryptocurrency
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK

Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics

bitcoindigital forensicscryptocurrency
1 2 3 4 5
8 7 6
1 2 3 4 5
9 8 7 6
1 2 3 4 5
10 9 8 7 6
1 2 3 4 5
10 9 8 7 6
11

Recommended for you

Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics

The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.

bitcoincryptocurrencycryptography
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview

Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon

bitcoincryptocurrencyblockchain
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group

The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.

cyber securitycyber espionagecyber attack
1 2 3 4 5
10 9 8 7 6
11 12
1 2 3 4 5
10 9 8 7 6
11 12 13
1 2 3 4 5
10 9 8 7 6
11 12 13 14
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15

Recommended for you

Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score

This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!

cyber espionagecyber securityit security
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening

This document provides a checklist for hardening an Android device with various security settings and recommendations. It suggests forgetting unused Wi-Fi networks, turning off location services and Bluetooth when not in use, limiting saved SMS/MMS messages, updating to the latest OS version, and not rooting or installing apps from untrusted sources. It also recommends enabling encryption, auto-lock, and the Android Device Manager for remote wiping a lost device. Additional security measures mentioned include disabling network notifications and form auto-fill, and showing security warnings for visited sites.

configuredeviceandroid
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now

Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.

securitycyber securitymanage
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 1
embedded in Block 2
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 2
embedded in Block 3
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
Mathematically connected Hash of Block 3
embedded in Block 4

Recommended for you

APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?

Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!

russiamalwareapt
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides

If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights. During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to: - Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value - Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems - Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors - Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported - Look Ahead: Gain insights into where FME is headed with coordinate systems in the future Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!

20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf

Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 : - Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants. - REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.

genaicloudrgpd
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
So, we get a chain of blocks …
1 2 3 4 5
10 9 8 7 6
11 12 13 14 15
….Mathematically connected
So, we get a chain of blocks …
1 2 3 4 5
11 12 13 14 15
….Mathematically connected
So, we get a chain of blocks …
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation

Java Servlet programs

Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry

Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data. The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs. Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution! Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.

cloudcloud native observabilitycloud native
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter

Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx

Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.

rpa in transportationrpa in transportation industryrpa in transportation sector
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy

Not so much to say

TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In

Six months into 2024, and it is clear the privacy ecosystem takes no days off!! Regulators continue to implement and enforce new regulations, businesses strive to meet requirements, and technology advances like AI have privacy professionals scratching their heads about managing risk. What can we learn about the first six months of data privacy trends and events in 2024? How should this inform your privacy program management for the rest of the year? Join TrustArc, Goodwin, and Snyk privacy experts as they discuss the changes we’ve seen in the first half of 2024 and gain insight into the concrete, actionable steps you can take to up-level your privacy program in the second half of the year. This webinar will review: - Key changes to privacy regulations in 2024 - Key themes in privacy and data governance in 2024 - How to maximize your privacy program in the second half of 2024

data privacyprivacy complianceai
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Trust | Third party Negation |Hash Cash| Public Keys | Private Keys | y2 = x3 + 7 | RIPEMD-160 | SHA-256 |
Finite Fields | Secp256k1 standard | Distributed Ledger | 03 Jan 2009 | Satoshi Nakamoto | ASIC | Mining |
Proof of work | Consensus | ECDSA| Prime Numbers| Immutability | Cryptography | Transactions | Wallets
| Wallet file | data extraction | Linux system | Bitcoin Core | Bitcoin Scripts | Bloom filters | BIP0037 Bloom
filters | Getting Merkle blocks | getting transactions of interest | Using multiple hash functions | Gossip
Protocol | GPU |FPGA | The transaction lifecycle | The transaction data structures | Types of scripts |
Coinbase transactions | Transaction validations |Transaction bugs | Difficulty adjustment and retargeting
algorithms | Kimoto Gravity Well Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well |
Dark Gravity Wave | Bitcoin limitations | Privacy and anonymity | Extended protocols on top of Bitcoin
|Colored coins | Hashing algorithms | Difficulty adjustment algorithms | Inter-block time | Block rewards |
Reward halving rate |Block size and transaction size | Dark Gravity Wave| DigiShield | Difficulty adjustment
algorithms | Inter-block time | Block rewards | Reward halving rate | Block size and transaction size |
Bitcoin Development Environment | Compiling Bitcoin Core from the Source Code | Selecting a Bitcoin Core
Release | Configuring the Bitcoin Core Build | Building the Bitcoin Core Executables | Running a Bitcoin Core
Node | Running Bitcoin Core for the First Time | Configuring the Bitcoin Core Node |Bitcoin Core
Application Programming Interface (API) | Getting Information on the Bitcoin Core Client Status | Exploring
and Decoding Transactions | Exploring Blocks | Using Bitcoin Core’s Programmatic Interface | Advanced
Transactions and Scripting | Multisignature | Pay-to-Script-Hash (P2SH) | P2SH Addresses | Benefits of P2SH
| Redeem Script and Validation | Data Recording Output (RETURN) | Timelocks | Transaction Locktime
(nLocktime) | Check Lock Time Verify (CLTV) | Relative Timelocks | Relative Timelocks with nSequence |
Relative Timelocks with CSV | Median-Time-Past | Timelock Defense Against Fee Sniping | Scripts with Flow

Recommended for you

Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...

This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator. Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/ Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.

a11yaccessibilityalt text
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops

This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization. Key Takeaways: * Understand why connection pooling is essential for high-traffic applications * Explore various connection poolers available for PostgreSQL, including pgbouncer * Learn the configuration options and functionalities of pgbouncer * Discover best practices for monitoring and troubleshooting connection pooling setups * Gain insights into real-world use cases and considerations for production environments This presentation is ideal for: * Database administrators (DBAs) * Developers working with PostgreSQL * DevOps engineers * Anyone interested in optimizing PostgreSQL performance Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services

postgresqlpgsqldatabase
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf

Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment. How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.

pigging solutionsprocess piggingproduct transfers
WHAT DOES
BLOCKCHAIN
TECHNOLOGY
ACTUALLY ACHIEVE?
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
BLOCKCHAIN

Recommended for you

RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx

Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation

rpa in healthcarerpa in healthcare usarpa in healthcare industry
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024

Everything that I found interesting about machines behaving intelligently during June 2024

quantumfaxmachine
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection

Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.

cybersecurityanomaly detectionadvanced techniques
COMMON “GLOBAL”
BLOCKCHAIN PLATFORM
BLOCKCHAIN 1
BLOCKCHAIN 2
BLOCKCHAIN 3
INTER
OPERABILITY
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure

Recent advancements in the NIST-JARVIS infrastructure: JARVIS-Overview, JARVIS-DFT, AtomGPT, ALIGNN, JARVIS-Leaderboard

jarvisjarvis-dftalignn
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024

This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator. Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/ Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.

a11yaccessibilityalt text
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...

Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)

user modelinguser profilinguser model
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges

accommodate the strengths, weaknesses, threats and opportunities of autonomous vehicles

automotive self-driving car technology
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf

Profile portofolio

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf

Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.

neo4jneo4j webinarsgraph database
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
BLOCKCHAIN
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

WHAT ARE WE DOING ?
Blockchain and Cyber Defense Strategies in new genre times
https://avasant.com/report/blockchain-adoption-indian-states/
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

Blockchain and Cyber Defense Strategies in new genre times
KEEP IN MIND
OPERATING SYSTEMS
CRYPTOGRAPHY STANDARDS

Recommended for you

ENCRYPTION STANDARDS
AADHAR ON ANDROID & iPHONE
UPI ON ANDROID & iPHONE
AI MODELS

Recommended for you

Regional versions of LLMs?
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
FRONTIER : Speed of 1685
PETAFLOPS
AIRAWAT : Speed of 13.17
PETAFLOPS
SUPERCOMPUTERs

Recommended for you

DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR
WE ARE HAPPY BEING USERS?
AR – VR –ER - MR
• Theoretically reduced risk of built-in functionalities that could gather user data for foreign entities.
• Alignment with government regulations or data residency requirements for data sovereignty.
BROWSERs
STORAGE SSD/HDD/RAMs
• Hardware Backdoors: Theoretical risk that foreign governments could introduce hardware
backdoors during production
• Supply Chain Vulnerabilities: Supply chain for foreign-made HDDs can be complex, making it
harder to track and potentially introducing vulnerabilities where malicious actors could tamper with the
drives.
• Enterprise routers/switches: Smaller process (14nm-7nm) for better
performance and lower power consumption.
• Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES

Recommended for you

ANTIVIRUS-UTMs-FIREWALLS
ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during
manufacturing
SEMI CONDUCTORS & PROCESSORS
SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nm chip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?

Recommended for you

15 to 25 countries
MAIN FRAME OS
• Unisys
• IBM
• Fujitso
• HP
• BULL
• Vendor Lock-in
• Limited Customization
• Potential Backdoors
ZERO CLICK
THREATS
AD TECH

Recommended for you

FMRI-AI
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Source: https://www.submarinecablemap.com/
Blockchain and Cyber Defense Strategies in new genre times

Recommended for you

NTP
WELCOME QUANTUM & POST
QUANTUM TIMES!!!
ICANN
● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and
recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO
includes stakeholder groups representing business, intellectual property interests, non-commercial users, and
Internet service providers.
● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies
related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's
decision-making processes.
● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP
address allocation policies and representing the interests of the Regional Internet Registries (RIRs).
● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual
Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by
regional At-Large organizations.
● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related
to public policy and government concerns.
● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related
to the operation, administration, security, and integrity of the root server system, which is a critical part of the
Internet's infrastructure.
● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on
issues related to the security and stability of the Internet's naming and address allocation systems.
ICANN

Recommended for you

CLOUD HARDWARE LEADING COMPANIES
• Dell Technologies
• Hewlett Packard Enterprise (HPE)
• Lenovo
• Cisco
• Inspur (Chinese company)
• Huawei (Chinese company)
• Gigabyte
• Supermicro
• NetApp
• NVIDIA
CLOUD SOFTWARE/APIs LEADING COMPANIES
• Microsoft Azure
• Amazon Web Services
• Google Cloud Platform
• VMware (Software)
• Red Hat (Software)
• OpenStack
• CloudBees
• Chef
• Puppet
• Ansible
CLOUD INFRASTRUCTURE
INSERT PIC ZERO DAY- SIDE CHANNEL ETC
NATIONAL E-MAIL??
• Snapdeal
• Swiggy
• Udaan
• Zomato
• Dream 11
• Flipkart
• Hike
• MakeMyTrip
• Byju's
• Ola
• Oyo
• Paytm Mall
• Paytm.com
• PolicyBazaar
• Quikr
• Rivigo
• Snapdeal
• BigBasket
Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted-
india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments.
18 Unicorn companies
in India have over
$3,500 million of
Chinese investments
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........

Recommended for you

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
INTERNET
USA - ICANN(Non Govt)
RUSSIA - RuNET
China - GFW
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATING SYSTEMS
USA - WINDOWS/iOS
RUSSIA - Astra Linux, Mandriva, Sailfish
China - HarmonyOS
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
INTERNET
USA - ICANN(Non Govt)
RUSSIA - RuNET
China - GFW
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATING SYSTEMS
USA - WINDOWS/iOS
RUSSIA - Astra Linux, Mandriva, Sailfish
China - HarmonyOS
CRYPTOGRAPHY
USA - NIST
RUSSIA - GOST
(Gosudarstvennyĭ Standart)
China - SCA (State Cryptography
Administration)
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
INTERNET
USA - ICANN(Non Govt)
RUSSIA - RuNET
China - GFW

Recommended for you

GFW IN CHINA
RuNET 2020
Blockchain and Cyber Defense Strategies in new genre times
• Laplace Mechanism
• Gaussian Mechanism
• Randomized Response
• Smoothing
• Clipping
• Quantization
• Privacy-Preserving Data
Differential Privacy
Data Sovereignty + Differential Privacy = Stronger
Protection

Recommended for you

•FedAvg (Federated Averaging)
•FedSGD (Federated Stochastic
Gradient Descent)
•FedProx (Federated Proximal)
•Differential Private Federated
Learning
Federated Learning
Homomorphic
Encryption
Retrieval
Augmented
Generation
PALAPA RING INDONESIA

Recommended for you

Contact me at anupamtiwari@pm.me
[https://orcid.org/0000-0002-9097-2246]
https://www.youtube.com/@bnab
Blockchain and Cyber Defense Strategies in new genre times

More Related Content

Similar to Blockchain and Cyber Defense Strategies in new genre times

Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Rapid7
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
Ulf Mattsson
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
Asma Swapna
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
Ulf Mattsson
 
Smart Contract Security Testing
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security Testing
Dilum Bandara
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
Yusuf Hadiwinata Sutandar
 
Automating cloud security - Jonny Griffin
Automating cloud security - Jonny GriffinAutomating cloud security - Jonny Griffin
Automating cloud security - Jonny Griffin
Jonnathan Griffin
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
IRJET Journal
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
Ulf Mattsson
 
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalDoag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
OPITZ CONSULTING Deutschland
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
Mustafa Kuğu
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEEMEMTECHSTUDENTPROJECTS
 
2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf
AlexKarasulu1
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
Nuri Cankaya
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
Ulf Mattsson
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 

Similar to Blockchain and Cyber Defense Strategies in new genre times (20)

Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
 
Smart Contract Security Testing
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security Testing
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
 
Automating cloud security - Jonny Griffin
Automating cloud security - Jonny GriffinAutomating cloud security - Jonny Griffin
Automating cloud security - Jonny Griffin
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalDoag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf2010.hari_kannan.phd_thesis.slides.pdf
2010.hari_kannan.phd_thesis.slides.pdf
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 

More from anupriti

Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
anupriti
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
anupriti
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
anupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
anupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
anupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
anupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
anupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
anupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
anupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
anupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
anupriti
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
anupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
anupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
anupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
anupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
anupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
anupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
anupriti
 

More from anupriti (20)

Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 

Recently uploaded

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 

Recently uploaded (20)

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 

Blockchain and Cyber Defense Strategies in new genre times

  • 2. #GPCSSI2024 11th Batch of Gurugram Police Cyber Security Internship 2024
  • 5. Secure Network Configuration Security audits and assessments
  • 6. Intrusion Detection and Prevention Systems (IDPS) Phishing Prevention Secure Network Configuration Data Encryption Backup and Disaster Recovery Endpoint protection Incident response planning Security policies and procedures Security audits and assessments
  • 7. Intrusion Detection and Prevention Systems (IDPS) Antivirus/Antimalware Software Secure Coding Practices Phishing Prevention Secure Network Configuration Data Encryption Security Monitoring and Incident Response Backup and Disaster Recovery Endpoint protection Network monitoring and logging Incident response planning Secure virtualization practices Security policies and procedures SIEM Security audits and assessments
  • 8. Intrusion Detection and Prevention Systems (IDPS) Unified Threat Management (UTM) Antivirus/Antimalware Software Patch Management Secure Coding Practices Phishing Prevention Secure Network Configuration Data Encryption Employee Training and Awareness Security Monitoring and Incident Response Web Application Firewalls (WAF) Network Segmentation Backup and Disaster Recovery Endpoint protection Physical security controls Network monitoring and logging Incident response planning Secure file transfer protocols (SFTP) Secure virtualization practices Security policies and procedures SIEM Application white listing Security audits and assessments
  • 9. Firewalls Intrusion Detection and Prevention Systems (IDPS) Unified Threat Management (UTM) Access Controls Antivirus/Antimalware Software Patch Management Secure Coding Practices Phishing Prevention Secure Network Configuration Data Encryption Employee Training and Awareness Security Monitoring and Incident Response Web Application Firewalls (WAF) Network Segmentation Backup and Disaster Recovery Data loss prevention (DLP) Secure remote access (VPN) Secure email gateways Secure password policies Endpoint protection Device management Secure web browsing practices Physical security controls Two-factor authentication (2FA) Network monitoring and logging Incident response planning Vulnerability scanning and assessment Secure file transfer protocols (SFTP) Secure virtualization practices Security policies and procedures SIEM Application white listing Network segmentation and isolation Security audits and assessments
  • 10. Firewalls Intrusion Detection and Prevention Systems (IDPS) Unified Threat Management (UTM) Access Controls Antivirus/Antimalware Software Patch Management Secure Coding Practices Phishing Prevention Secure Network Configuration Data Encryption Employee Training and Awareness Security Monitoring and Incident Response Web Application Firewalls (WAF) Network Segmentation Backup and Disaster Recovery Data loss prevention (DLP) Secure remote access (VPN) Secure email gateways Secure password policies Endpoint protection Device management Secure web browsing practices Physical security controls Two-factor authentication (2FA) Network monitoring and logging Incident response planning Vulnerability scanning and assessment Secure file transfer protocols (SFTP) Secure virtualization practices Security policies and procedures SIEM Application white listing Network segmentation and isolation Security audits and assessments
  • 16. MAKE THE PROBLEM HARDER FOR CRIMINALS TO BREAK
  • 20. BLOCK with some DATA HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size
  • 21. HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size BLOCK with some DATA
  • 22. HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size BLOCK with some DATA
  • 23. HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size BLOCK with some DATA
  • 24. HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size BLOCK with some DATA
  • 25. SHA-256 (Hash algorithm) HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size There are 100’s of algorithms & this is one TYPE BLOCK with some DATA
  • 26. SHA-256 (Hash algorithm) 6bcec30f359e597986bcdc075eed3e339a3a1 8673ec4624425d75247eacce9f5 HASH Cryptographic function, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size BLOCK with some DATA
  • 27. Text input : TALK ON 27 JUN 2024 HASH
  • 28. HASH Let this be a sample TEXT data and be applied HASH upon Text input : TALK ON 27 JUN 2024
  • 29. Text input : TALK ON 27 JUN 2024 58b162269025ef5388e111768847ef995e8831f 5d82a5d22076833ed25b29b95 HASH Always 64 digit output
  • 30. Text input : TALK ON 27 JUN 2024 58b162269025ef5388e111768847ef995e8831f 5d82a5d22076833ed25b29b95 HASH Always 64 digit output
  • 31. Text input : TALK ON 27 JUN 2024 58b162269025ef5388e111768847ef995e8831f 5d82a5d22076833ed25b29b95 HASH WATCH HERE
  • 32. Text input : TALK ON 27 JUn 2024 eb23df9940ebe8ad1ad9ef271e7de5923e7b45 93199ce699f82c9e4986df737b HASH WATCH HERE
  • 35. 1 2
  • 36. 1 2 3
  • 37. 1 2 3 4
  • 38. 1 2 3 4 5
  • 39. 1 2 3 4 5 6
  • 40. 1 2 3 4 5 7 6
  • 41. 1 2 3 4 5 8 7 6
  • 42. 1 2 3 4 5 9 8 7 6
  • 43. 1 2 3 4 5 10 9 8 7 6
  • 44. 1 2 3 4 5 10 9 8 7 6 11
  • 45. 1 2 3 4 5 10 9 8 7 6 11 12
  • 46. 1 2 3 4 5 10 9 8 7 6 11 12 13
  • 47. 1 2 3 4 5 10 9 8 7 6 11 12 13 14
  • 48. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15
  • 49. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15
  • 50. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15 Mathematically connected Hash of Block 1 embedded in Block 2
  • 51. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15 Mathematically connected Hash of Block 2 embedded in Block 3
  • 52. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15 Mathematically connected Hash of Block 3 embedded in Block 4
  • 53. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15 So, we get a chain of blocks …
  • 54. 1 2 3 4 5 10 9 8 7 6 11 12 13 14 15 ….Mathematically connected So, we get a chain of blocks …
  • 55. 1 2 3 4 5 11 12 13 14 15 ….Mathematically connected So, we get a chain of blocks …
  • 64. Trust | Third party Negation |Hash Cash| Public Keys | Private Keys | y2 = x3 + 7 | RIPEMD-160 | SHA-256 | Finite Fields | Secp256k1 standard | Distributed Ledger | 03 Jan 2009 | Satoshi Nakamoto | ASIC | Mining | Proof of work | Consensus | ECDSA| Prime Numbers| Immutability | Cryptography | Transactions | Wallets | Wallet file | data extraction | Linux system | Bitcoin Core | Bitcoin Scripts | Bloom filters | BIP0037 Bloom filters | Getting Merkle blocks | getting transactions of interest | Using multiple hash functions | Gossip Protocol | GPU |FPGA | The transaction lifecycle | The transaction data structures | Types of scripts | Coinbase transactions | Transaction validations |Transaction bugs | Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well | Dark Gravity Wave | Bitcoin limitations | Privacy and anonymity | Extended protocols on top of Bitcoin |Colored coins | Hashing algorithms | Difficulty adjustment algorithms | Inter-block time | Block rewards | Reward halving rate |Block size and transaction size | Dark Gravity Wave| DigiShield | Difficulty adjustment algorithms | Inter-block time | Block rewards | Reward halving rate | Block size and transaction size | Bitcoin Development Environment | Compiling Bitcoin Core from the Source Code | Selecting a Bitcoin Core Release | Configuring the Bitcoin Core Build | Building the Bitcoin Core Executables | Running a Bitcoin Core Node | Running Bitcoin Core for the First Time | Configuring the Bitcoin Core Node |Bitcoin Core Application Programming Interface (API) | Getting Information on the Bitcoin Core Client Status | Exploring and Decoding Transactions | Exploring Blocks | Using Bitcoin Core’s Programmatic Interface | Advanced Transactions and Scripting | Multisignature | Pay-to-Script-Hash (P2SH) | P2SH Addresses | Benefits of P2SH | Redeem Script and Validation | Data Recording Output (RETURN) | Timelocks | Transaction Locktime (nLocktime) | Check Lock Time Verify (CLTV) | Relative Timelocks | Relative Timelocks with nSequence | Relative Timelocks with CSV | Median-Time-Past | Timelock Defense Against Fee Sniping | Scripts with Flow
  • 81. WHAT ARE WE DOING ?
  • 102. AADHAR ON ANDROID & iPHONE
  • 103. UPI ON ANDROID & iPHONE
  • 108. FRONTIER : Speed of 1685 PETAFLOPS AIRAWAT : Speed of 13.17 PETAFLOPS SUPERCOMPUTERs
  • 109. DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR WE ARE HAPPY BEING USERS? AR – VR –ER - MR
  • 110. • Theoretically reduced risk of built-in functionalities that could gather user data for foreign entities. • Alignment with government regulations or data residency requirements for data sovereignty. BROWSERs
  • 111. STORAGE SSD/HDD/RAMs • Hardware Backdoors: Theoretical risk that foreign governments could introduce hardware backdoors during production • Supply Chain Vulnerabilities: Supply chain for foreign-made HDDs can be complex, making it harder to track and potentially introducing vulnerabilities where malicious actors could tamper with the drives.
  • 112. • Enterprise routers/switches: Smaller process (14nm-7nm) for better performance and lower power consumption. • Home routers/basic switches: Larger process (28nm+) for lower cost. MODEM / ROUTER / SWITCHES
  • 114. ASIC/ FPGA/ TPU/ GPU Potential vulnerabilities or backdoors built into the chips during manufacturing
  • 115. SEMI CONDUCTORS & PROCESSORS
  • 116. SEMI CONDUCTORS & PROCESSORS Number of countries involved in new generation nm chip manufacturing is indeed difficult due to the complex and global nature of the supply chain…any GUESSES?
  • 117. 15 to 25 countries
  • 118. MAIN FRAME OS • Unisys • IBM • Fujitso • HP • BULL • Vendor Lock-in • Limited Customization • Potential Backdoors
  • 125. NTP
  • 126. WELCOME QUANTUM & POST QUANTUM TIMES!!!
  • 127. ICANN
  • 128. ● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO includes stakeholder groups representing business, intellectual property interests, non-commercial users, and Internet service providers. ● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's decision-making processes. ● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP address allocation policies and representing the interests of the Regional Internet Registries (RIRs). ● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by regional At-Large organizations. ● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related to public policy and government concerns. ● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related to the operation, administration, security, and integrity of the root server system, which is a critical part of the Internet's infrastructure. ● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on issues related to the security and stability of the Internet's naming and address allocation systems. ICANN
  • 129. CLOUD HARDWARE LEADING COMPANIES • Dell Technologies • Hewlett Packard Enterprise (HPE) • Lenovo • Cisco • Inspur (Chinese company) • Huawei (Chinese company) • Gigabyte • Supermicro • NetApp • NVIDIA CLOUD SOFTWARE/APIs LEADING COMPANIES • Microsoft Azure • Amazon Web Services • Google Cloud Platform • VMware (Software) • Red Hat (Software) • OpenStack • CloudBees • Chef • Puppet • Ansible CLOUD INFRASTRUCTURE INSERT PIC ZERO DAY- SIDE CHANNEL ETC
  • 131. • Snapdeal • Swiggy • Udaan • Zomato • Dream 11 • Flipkart • Hike • MakeMyTrip • Byju's • Ola • Oyo • Paytm Mall • Paytm.com • PolicyBazaar • Quikr • Rivigo • Snapdeal • BigBasket Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted- india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments. 18 Unicorn companies in India have over $3,500 million of Chinese investments
  • 132. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA...........
  • 133. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA........... GPS USA - NAVSTAR RUSSIA - GLONASS China - BeiDou
  • 134. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA........... GPS USA - NAVSTAR RUSSIA - GLONASS China - BeiDou INTERNET USA - ICANN(Non Govt) RUSSIA - RuNET China - GFW
  • 135. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA........... OPERATING SYSTEMS USA - WINDOWS/iOS RUSSIA - Astra Linux, Mandriva, Sailfish China - HarmonyOS GPS USA - NAVSTAR RUSSIA - GLONASS China - BeiDou INTERNET USA - ICANN(Non Govt) RUSSIA - RuNET China - GFW
  • 136. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA........... OPERATING SYSTEMS USA - WINDOWS/iOS RUSSIA - Astra Linux, Mandriva, Sailfish China - HarmonyOS CRYPTOGRAPHY USA - NIST RUSSIA - GOST (Gosudarstvennyĭ Standart) China - SCA (State Cryptography Administration) GPS USA - NAVSTAR RUSSIA - GLONASS China - BeiDou INTERNET USA - ICANN(Non Govt) RUSSIA - RuNET China - GFW
  • 140. • Laplace Mechanism • Gaussian Mechanism • Randomized Response • Smoothing • Clipping • Quantization • Privacy-Preserving Data Differential Privacy Data Sovereignty + Differential Privacy = Stronger Protection
  • 141. •FedAvg (Federated Averaging) •FedSGD (Federated Stochastic Gradient Descent) •FedProx (Federated Proximal) •Differential Private Federated Learning Federated Learning
  • 145. Contact me at anupamtiwari@pm.me [https://orcid.org/0000-0002-9097-2246] https://www.youtube.com/@bnab