
Four specific cyber threats related to blockchain use and how to manage them
Four specific cyber threats related to blockchain use and how to manage them
An article published by World Economic Forum says that while ‘blockchain will be key to embracing the Fourth Industrial Revolution’, organizations must be wary of associated cyber threats.
The article, ‘Is blockchain really secure? Here are four pressing cyber threats you must consider’ discusses the following ‘four major cyber threats that need to be considered with regards to blockchain’:
Consensus protocol threats
Blockchains use consensus protocols to reach agreement among participants when adding a new block. Since there is no central authority, consensus protocol vulnerabilities threaten to control a blockchain network and dictate its consensus decisions from various attack vectors. Consequently, the consensus protocol must be evaluated and tested properly to ensure it always reaches an expected resolution.
Breach of privacy and confidentiality
The second threat is related to the exposure of sensitive and private data. Blockchains are transparent by design, and participants may share data that attackers can use to infer confidential or sensitive information.
As a result, organizations must carefully evaluate their blockchain usage to ensure that only permitted data is shared without exposing any private or sensitive information.
Compromising of private keys
The third threat is the compromising of private keys that blockchains use to identify and authenticate participants.
Attackers may compromise private keys to control participants’ accounts and associated assets by using classical information technology methods, such as phishing and dictionary attacks, or by exploiting vulnerabilities in blockchain clients’ software.
Smart contract defects
The fourth threat is that of smart contract defects that adversaries may exploit to launch attacks.
Smart contracts must be evaluated and appropriately tested to resolve possible defects and adhere to business and legal requirements.
To improve blockchain security various actions are highlighted:
This content was originally published here.