GET IN TOUCH WITH PAKKO, CREATIVE DIRECTOR ALIGNED FOR THE FUTURE OF CREATIVITY.
PAKKO@PAKKO.ORG

LA | DUBAI | NY | CDMX

PLAY PC GAMES? ADD ME AS A FRIEND ON STEAM

 


Back to Top

Pakko De La Torre // Creative Director

Four specific cyber threats related to blockchain use and how to manage them

Four specific cyber threats related to blockchain use and how to manage them

Four specific cyber threats related to blockchain use and how to manage them

An article published by World Economic Forum says that while ‘blockchain will be key to embracing the Fourth Industrial Revolution’, organizations must be wary of associated cyber threats.

The article, ‘Is blockchain really secure? Here are four pressing cyber threats you must consider’ discusses the following ‘four major cyber threats that need to be considered with regards to blockchain’:

Consensus protocol threats

Blockchains use consensus protocols to reach agreement among participants when adding a new block. Since there is no central authority, consensus protocol vulnerabilities threaten to control a blockchain network and dictate its consensus decisions from various attack vectors. Consequently, the consensus protocol must be evaluated and tested properly to ensure it always reaches an expected resolution.

Breach of privacy and confidentiality

The second threat is related to the exposure of sensitive and private data. Blockchains are transparent by design, and participants may share data that attackers can use to infer confidential or sensitive information.

As a result, organizations must carefully evaluate their blockchain usage to ensure that only permitted data is shared without exposing any private or sensitive information.

Compromising of private keys

The third threat is the compromising of private keys that blockchains use to identify and authenticate participants.

Attackers may compromise private keys to control participants’ accounts and associated assets by using classical information technology methods, such as phishing and dictionary attacks, or by exploiting vulnerabilities in blockchain clients’ software.

Smart contract defects

The fourth threat is that of smart contract defects that adversaries may exploit to launch attacks.

Smart contracts must be evaluated and appropriately tested to resolve possible defects and adhere to business and legal requirements.

To improve blockchain security various actions are highlighted:

This content was originally published here.