Index
A
- Advanced Encryption Standard (AES) / SimpleLocker
- advanced persistence threat (APT)
- about / Advanced persistence threat (APT)
- advanced / Advanced persistence threat (APT)
- persistent / Advanced persistence threat (APT)
- threat / Advanced persistence threat (APT)
- targets / What makes APTs so different?
- goal / What makes APTs so different?
- human factors / What makes APTs so different?
- Aggregate Caching Forwarder (ACF) / Architecture
- amplification attack / Amplification attacks
- Annual Privacy Forum (APF) / Europe
- Apache Software Foundation (ASF) / Workings of Hyperledger and transaction processing
- application binary interface (ABI) / Smart contract
- application resources
- targeting / Attacks targeting application resources
- DNS flooding / DNS flooding
- regular expression DoS attacks / Regular expression DoS attacks
- hash collision DoS attacks / Hash collision DoS attacks
- architecture, Hyperledger
- consensus layer / Architecture and core components
- contract layer / Architecture and core components
- communication layer / Architecture and core components
- data store abstraction / Architecture and core components
- crypto abstraction / Architecture and core components
- identity services / Architecture and core components
- policy services / Architecture and core components
- APIs / Architecture and core components
- interoperation / Architecture and core components
- artificial neural network (ANN) / The security ecosystem
- assume breach approach
- about / The assume breach approach
- red-term exercise / The assume breach approach
- continuous monitoring / The assume breach approach
- asymmetric encryption / Asymmetric key encryption
- Attribute-based access control (ABAC) / Achieving confidentiality with Hyperledger Fabric
- attribute certificate (ACert) / Achieving confidentiality with Hyperledger Fabric
- Attribute Certificate Authority (ACA) / Achieving confidentiality with Hyperledger Fabric
- authoritative name servers
- master server / Name servers
- slave server / Name servers
- autonomous propagation / Delivery
- availability
- using, in blockchain / Understanding blockchain on availability, Availability in the current blockchain network
- system failure, avoiding / No single point of failure
- determining / Business and availability
- Availability, Integrity, and Confidentiality (AIC) security triad / What is the CIA security triad?
B
- back-chaining propagation / Delivery
- BIND / DNS topology for large enterprises
- bitcoin (BTC)
- about / Consensus – the core of blockchain
- versus Ethereum / Bitcoin versus Ethereum versus Hyperledger
- block
- block body / IP packet versus block
- blockchain
- about / What is blockchain?
- history / A brief history
- fundamentals / Fundamentals of the blockchain
- using / Who is using blockchain and how?, When should you use blockchain?
- versus internet / Internet versus blockchain
- transaction preparation / How blockchain works
- transaction verification / How blockchain works
- block generation / How blockchain works
- block validation / How blockchain works
- building blocks / The building blocks of blockchain
- block / Block
- cryptography / Cryptography – digital signature and hashing algorithm
- consensus / Consensus – the core of blockchain
- use cases / Business adaptation
- permission restrictions / Bitcoin versus Ethereum versus Hyperledger
- data access, restrictions / Bitcoin versus Ethereum versus Hyperledger
- consensus mechanism / Bitcoin versus Ethereum versus Hyperledger
- scalability / Bitcoin versus Ethereum versus Hyperledger
- anonymity / Bitcoin versus Ethereum versus Hyperledger
- governance / Bitcoin versus Ethereum versus Hyperledger
- native currency / Bitcoin versus Ethereum versus Hyperledger
- scripting / Bitcoin versus Ethereum versus Hyperledger
- used, for transforming DDoS protection / How can blockchain transform DDoS protection?
- decision path / Decision path for blockchain
- avoiding / When should you not use blockchain?
- challenges / Challenges with blockchain
- cyber security, future / The future of cybersecurity with blockchain
- Blockchain-as-a-service (BaaS) / Blockchain-as-a-service (BaaS)
- blockchain-based DNS solution
- about / Blockchain-based DNS solution
- X.509 PKI replacement / X.509 PKI replacement
- MITM-proof DNS infrastructure / MITM-proof DNS infrastructure
- block header / IP packet versus block
- booster script / Weaponization
- botnet / What is a DDoS attack?
- bots / Distributed denial-of-service (DDoS) attacks, What is a DDoS attack?
- Breach Level Index (BLI) / The future of cybersecurity with blockchain
- Bring Your Own Device (BYOD) / Corporate
- building blocks, Hyperledger
- shared ledger / Architecture and core components
- consensus algorithm / Architecture and core components
- privacy / Architecture and core components
- smart contract / Architecture and core components
C
- CA / Certificate authority (CA)
- Canonical Name (CNAME) / DNS records
- capabilities, Hyperledger Fabric
- identity management / Hyperledger Fabric capabilities
- efficient processing / Hyperledger Fabric capabilities
- privacy / Hyperledger Fabric capabilities
- confidentiality / Hyperledger Fabric capabilities
- chaincode functionality / Hyperledger Fabric capabilities
- central source propagation / Delivery
- certificate authority (CA)
- about / PKI in a nutshell
- public digital certificate authority / Certificate authority (CA)
- private digital certificate authority / Certificate authority (CA)
- certificate repository (CR) / Certificate repository (CR)
- certificate revocation list (CRL) / Certificate authority (CA)
- certificates
- Secure Socket Layer (SSL) certificate / Certificate
- client certificate / Certificate
- code signing certificate / Certificate
- email certificate / Certificate
- chain of trust / Architecture
- Chief Information Security Officer (CISO) / Corporate
- cloud-based solution / How does it work?
- components, DNS
- namespace / Namespace
- name servers / Name servers
- resolver / Resolver
- components, PKI
- asymmetric key encryption / Asymmetric key encryption
- certificate / Certificate
- CA / Certificate authority (CA)
- registration authority (RA) / Registration authority (RA)
- certificate repository (CR) / Certificate repository (CR)
- Computer Emergency Response Team (CERT-In) / India
- confidentiality
- about / Understanding blockchain on confidentiality
- using, in model / Confidentiality in the existing model
- using, in businesses / Businesses, blockchain, and confidentiality
- achieving, with Hyperledger Fabric / Achieving confidentiality with Hyperledger Fabric
- Confidentiality, Integrity, and Availability (CIA) security triad model
- about / What is the CIA security triad?
- confidentiality / Confidentiality
- integrity / Integrity
- availability / Availability
- configuration files / DNS topology for large enterprises
- consensus
- consortium blockchains / Private blockchain
- content delivery network (CDN) / Availability
- corporate
- about / Corporate
- endpoint detection and response (EDR) / Endpoint detection and response (EDR)
- deception technology / Deception technology
- cyber threat intelligence (CTI) / Cyber threat intelligence (CTI)
- country code top-level domain (ccTLD) / Registries, registrars, and registrants
- cryptography / Cryptography – digital signature and hashing algorithm
- CryptoLocker / CryptoLocker
- cyber attack
- reconnaissance / How does it work?
- weaponization / How does it work?
- delivery / How does it work?
- exploitation / How does it work?
- installation / How does it work?
- command and control / How does it work?
- cyber attack prevention strategies
- attack surface, reducing / The security ecosystem
- known threats, preventing / The security ecosystem
- unknown threats, preventing / The security ecosystem
- cyber kill chain / How does it work?
- cyber security
- future, with blockchain / The future of cybersecurity with blockchain
- cyber strategy
- URL / The United States (US)
- cyber threat intelligence (CTI) / Cyber threat intelligence (CTI)
D
- data breaches
- about / Data breaches
- malicious attacks / Data breaches
- weak security systems / Data breaches
- human error / Data breaches
- Equifax in Sep 2017 / Notable recent data breaches
- Verizon in July 2017 / Notable recent data breaches
- Edmodo in May 31, 2017 / Notable recent data breaches
- Verifone in March 7, 2017 / Notable recent data breaches
- impact / Impact of data breaches
- data breaches, impact
- financial loss / Impact of data breaches
- brand reputation loss / Impact of data breaches
- customer trust loss / Impact of data breaches
- data exfiltration
- decentralized application (dApp) / Web app versus dApp, dApp, Bitcoin versus Ethereum versus Hyperledger
- decentralized autonomous organization (DAO) / History
- decentralized public key infrastructure (DPKI)
- using / Decentralized infrastructure
- deception technology / Deception technology
- decision paths
- about / Decision path for blockchain
- IBM model / Decision path for blockchain
- Karl Wust and Arthur Gervais model / Decision path for blockchain
- Birch-Brown-Parulava model / Decision path for blockchain
- Delegated Proof of Stack (DPoS) / How blockchain works
- Democratic National Committee (DNC) / From script kiddies to geopolitical
- denial-of-service (DoS) attack / DDoS attacks
- Department of Defense (DoD) / Insider threat profile
- Department of Justice (DOJ) / Weaponization
- distributed application (dApp) / Understanding blockchain on availability
- distributed denial-of-service (DDoS) attacks
- about / Distributed denial-of-service (DDoS) attacks, Availability, DDoS attacks, What is a DDoS attack?
- script kiddies, migrating to geo-political / From script kiddies to geopolitical
- launching / Ease of launching a DDoS attack
- targeted countries / Top targeted countries
- working / How does it work?
- bot, building / Building up the botnet
- reconnaissance / Reconnaissance
- weaponization / Weaponization
- tools / Weaponization
- delivery / Delivery
- exploitation / Exploitation
- installation / Installation
- command and control (C2) / Command and control (C2)
- action on objectives / Action on objectives
- types / Types of DDoS attacks
- challenges / Challenges with current DDoS solutions
- transforming, with blockchain / How can blockchain transform DDoS protection?
- Distributed Ledger Technologies (DLT) / Architecture and core components
- DNS-based flooding / DNS flooding
- DNS architecture
- master DNS zone / Architecture
- slave DNS zone / Architecture
- Aggregate Caching Forwarder (ACF) / Architecture
- DNSChain
- about / Blockchain-based DNS solution
- URL / Lab on Ethereum-based secure DNS infrastructure
- installing / Installing DNSChain
- DNS Operations, Analysis, and Research Center (DNS-OARC) / Architecture
- DNS spoofing
- DNS cache poisoning / DNS spoofing
- DNS server, compromising / DNS spoofing
- Man-in-the-middle (MITM) attack / DNS spoofing
- Domain Certificate Policies (DCPs) / Testing
- DomainKeys Identified Mail (DKIM) / DNS
- Domain Name System (DNS)
- about / DNS
- anti-spam / DNS
- load sharing / DNS
- privacy / DNS
- components / Understanding DNS components
- structure / DNS structure and hierarchy
- hierarchy / DNS structure and hierarchy
- root name server / Root name server
- TLD structure / Current TLD structure
- registries / Registries, registrars, and registrants
- registrars / Registries, registrars, and registrants
- registrants / Registries, registrars, and registrants
- records / DNS records
- architecture / Architecture
- challenges / Challenges with current DNS
- spoofing / DNS spoofing
- Dynamic Data Exchange (DDE) / Live attack execution
E
- Elastic Compute Cloud (EC2) / Internet versus blockchain
- encrypted HTTP attacks / Encrypted HTTP attacks
- endpoint detection and response (EDR) / Endpoint detection and response (EDR), The assume breach approach
- ENISA Threat Landscape (ETL) / Europe
- Ethereum
- about / Ethereum, What is Ethereum?
- history / History
- Ethereum Classic (ETC) / History
- Ethereum (ETH) / History
- smart contract / Smart contract
- Ethereum Virtual Machine (EVM) / EVM
- gas / Gas
- dApp / dApp
- versus Hyperledger / Bitcoin versus Ethereum versus Hyperledger
- Ethereum-based secure DNS infrastructure
- about / Lab on Ethereum-based secure DNS infrastructure
- lab preparation / Lab preparation
- namecoin blockchain, installation / Namecoin blockchain installation
- PowerDNS, installing / Installing PowerDNS
- DNSChain, installing / Installing DNSChain
- Ethereum IDE
- URL / Smart contract
- Ethereum Virtual Machine (EVM) / What is Ethereum?, EVM, Architecture and core components
- European Union agency for Network and Information Security (ENISA) / Europe
F
- flooding attacks
- User datagram protocol (UDP) flood / User datagram protocol (UDP) flood
- ICMP flood / ICMP flood
- Internet Group Management Protocol (IGMP) flood / Internet Group Management Protocol (IGMP) flood
- amplification attacks / Amplification attacks
- foundation layer
- evolution / Evolution at the foundation layer
G
- gas / Gas
- General Data Protection Regulation (GDPR)
- about / Europe, Challenges with blockchain
- URL / Europe
- General Public License (GPL) / Installing PowerDNS
- generic top-level-domain (gTLD) / Registries, registrars, and registrants
- Gladius project
- URL / Lab
- government
- about / Governments
- United States (US) / The United States (US)
- United Kingdom (UK) / The United Kingdom (UK)
- Europe / Europe
- India / India
H
- hardware security modules (HSMs) / Challenges of the existing PKI model
- Hash-based Message Authentication Code (HMAC) / Cryptography – digital signature and hashing algorithm
- High Orbit Ion Cannon (HOIC) / Weaponization
- hping / Weaponization
- Hyperledger
- overview / Hyperledger overview
- community-driven infrastructure / Program goal
- enterprise-grade framework / Program goal
- technical communities, building / Program goal
- awareness / Program goal
- building blocks / Architecture and core components
- Iroha / Architecture and core components
- Sawtooth / Architecture and core components
- Indy / Architecture and core components
- burrow / Architecture and core components
- Hyperledger Fabric encryption literary / Achieving confidentiality with Hyperledger Fabric
- Hyperledger Fabric model
- about / Hyperledger Fabric model
- core components / Hyperledeger Fabric core components
- nodes / Hyperledeger Fabric core components
- ledger / Hyperledeger Fabric core components
- channel / Hyperledeger Fabric core components
- world state / Hyperledeger Fabric core components
- chaincode / Hyperledeger Fabric core components
- consensus / Hyperledeger Fabric core components
- working / Workings of Hyperledger and transaction processing
- transaction processing / Workings of Hyperledger and transaction processing
- capabilities / Hyperledger Fabric capabilities
- confidentiality, achieving / Achieving confidentiality with Hyperledger Fabric
I
- IBM model / Decision path for blockchain
- indicator of compromise (IOC) / Cyber threat intelligence (CTI)
- information security (infosec) team / What is the CIA security triad?
- insider threats
- about / Insider threats
- defining / Some more ways to define insider threats
- profile / Insider threat profile
- integrity
- about / Blockchain on integrity
- using, in blockchain network / Integrity in the current blockchain network
- block arrangement / Block arrangement and immutability
- immutability / Block arrangement and immutability
- achieving, with Hyperledger / Achieving integrity with Hyperledger
- chain, verifying / Verifying chain integrity
- International Standard Organization (ISO) / Internet versus blockchain
- internet
- versus blockchain / Internet versus blockchain
- IP packet, versus block / IP packet versus block
- web app, versus dApp / Web app versus dApp
- Internet Assigned Numbers Authority (IANA) / Current TLD structure
- Internet Control Message Protocol (ICMP) / User datagram protocol (UDP) flood, ICMP flood
- Internet Corporation for Assigned Names and Numbers (ICANN) / Challenges of the existing PKI model, Current TLD structure
- Internet Group Management Protocol (IGMP) flood / Internet Group Management Protocol (IGMP) flood
- Internet Service Provider (ISP) / DNS
- Internet Systems Consortium (ISC) / Architecture
- intrusion prevention system (IPS) / Data breaches, Reconnaissance
- IP header / IP packet versus block
J
- Jester / From script kiddies to geopolitical
K
- Karl Wust and Arthur Gervais model / Decision path for blockchain
- key
- using / Certificate life cycle
- processing / Certificate life cycle
- Key Management Interoperability Protocol (KMIP) / Key management
L
- lab, 2FA
- about / Lab
- components / Components
- praparation / Preparation
- Node.js, installing / Installing Node.js
- Ethereum, turning up / Turning up Ethereum
- smart contract, turning up / Turning up the smart contract
- verification / Testing and verification
- testing / Testing and verification
- lab environment
- executing / Lab
- tuna application / Tuna application
- Lightweight Directory Access Protocol (LDAP) / PKI in a nutshell
- live attack execution / Live attack execution
- Low Orbit Ion Cannon (LOIC) / Weaponization
M
- mail exchanger (MX) / DNS records
- man-in-the-middle (MITM) attacks / Business adaptation, PKI
- managed security service (MSS) / The assume breach approach
- master DNS zone / Architecture
- Membership Service Provider (MSP) / Hyperledeger Fabric core components
- miner / How blockchain works
- multi-factor authentication (MFA) / Evolution of user authentication
N
- name server (NS)
- about / Name servers, Root name server, DNS records
- authoritative name server / Name servers
- caching name server / Name servers
- namespace / Namespace
- National Institute of Standards and Technology (NIST) / Certificate life cycle
- National Insurance Number (NINO) / Cryptography – digital signature and hashing algorithm
- National Registration Identity Card (NRIC) / Cryptography – digital signature and hashing algorithm
- nclay / Notable recent data breaches
- network topology / DNS topology for large enterprises
- nodes / Block
- NotPetya /
O
- on-premise solution / How does it work?
- one-time password (OTP) / Evolution of user authentication
- Open Systems Interconnection (OSI) / Internet versus blockchain
- Organization for the Advancement of Structured Information Standards (OASIS) / Key management
P
- payload / IP packet versus block
- permissioned blockchain / When should you use blockchain?
- personal identification number (PIN) / What is 2FA?
- pin-sha256 / MITM-proof DNS infrastructure
- pointer (PTR) / DNS records
- point of sale (POS) / Notable recent data breaches
- Ponemon Institute report
- URL / Impact of data breaches
- PowerDNS
- installing / Installing PowerDNS
- Practical Byzantine Fault Tolerance (PBFT) / How blockchain works
- private blockchain
- versus public blockchain / Private versus public blockchain
- about / Private blockchain
- Proof-of-Stake (PoS) / How blockchain works, When should you use blockchain?
- Proof-of-Work (PoW) / How blockchain works, When should you use blockchain?
- Proof of Elapsed Time (PoET) / Architecture and core components
- public blockchain / Public blockchain
- public key infrastructure (PKI)
- about / PKI, PKI in a nutshell, Blockchain-based DNS solution
- evolution / The evolution of PKI
- components / Components
- architecture / Architecture
- certificate life cycle / Certificate life cycle
- key management / Key management
- challenges / Challenges of the existing PKI model
- blockchain, using / How can blockchain help?
- decentralized infrastructure / Decentralized infrastructure
- deployment method / Deployment method
- prerequisites / Requirements
R
- ransomware
- about / Ransomware
- Ransomware-as-a-service (RaaS) / The monetization of hacking
- WannaCry /
- SimpleLocker / SimpleLocker
- TeslaCrypt / TeslaCrypt
- CryptoLocker / CryptoLocker
- PC Cyborg / PC Cyborg
- Ransomware-as-a-service (RaaS) / The monetization of hacking
- Reaction Policies (RP) / Testing
- reconnaissance / Live attack execution, Reconnaissance
- records / DNS records
- registrant / Registries, registrars, and registrants
- registrar / Registries, registrars, and registrants
- Registration authority (RA) / Registration authority (RA)
- registry / Registries, registrars, and registrants
- Relative Attack Surface Quotient (RASQ) / The security ecosystem
- remote procedure call (RPC) / Delivery
- Reset (RST) / TCP RST attack
- root name server / Root name server
- RSnake / Weaponization
S
- salve DNS zone / Architecture
- secret key / Asymmetric key encryption
- Secure File Transfer Protocol (SFTP) / DNS records
- secure sockets layer (SSL) based attack / Secure sockets layer (SSL)-based attack
- security challenges / Emerging security challenges
- security information and event management (SIEM) / The assume breach approach
- Sender Policy Framework (SPF) / DNS
- server resources
- targeting / Attacks targeting server resources
- TCP SYN flood / TCP SYN Flood
- TCP RST attack / TCP RST attack
- secure sockets layer (SSL) based attack / Secure sockets layer (SSL)-based attack
- encrypted HTTP attacks / Encrypted HTTP attacks
- SFA / Evolution of user authentication
- SHA-256 algorithm
- Shadow Brokers /
- SimpleLocker / SimpleLocker
- Simplified Byzantine Fault Tolerance (SBFT) / Workings of Hyperledger and transaction processing
- single-factor authentication (SFA) / Evolution of user authentication
- slowloris / Weaponization
- small office home office (SOHO) / Architecture
- social security number (SSN) / Notable recent data breaches, Cryptography – digital signature and hashing algorithm
- Start of Authority (SOA) / DNS records
- symmetric encryption / Asymmetric key encryption
T
- TCP RST attack / TCP RST attack
- TCP SYN flood / TCP SYN Flood
- techniques, tactics, and procedures (TTPs) analysis / The security ecosystem
- TeslaCrypt / TeslaCrypt
- text (TXT) / DNS records
- threat landscape
- about / Current threat landscape
- ransomware / Ransomware
- Distributed denial-of-service (DDoS) attacks / Distributed denial-of-service (DDoS) attacks
- insider threats / Insider threats
- data breaches / Data breaches
- advanced persistence threat (APT) / Advanced persistence threat (APT)
- tools, DDoS attacks
- Low Orbit Ion Cannon (LOIC) / Weaponization
- High Orbit Ion Cannon (HOIC) / Weaponization
- hping / Weaponization
- slowloris / Weaponization
- top-level domains (TLDs) / Ransomware, Resolver
- Tor / Ransomware
- Tovar / CryptoLocker
- Trivial File Transfer Protocol (TFTP) / Delivery
- trusted third party (TTP) / PKI in a nutshell
- tuna application
- about / Tuna application
- aim / Tuna application
- installation / Tuna application
- troubleshooting / Tuna application
- verification / Tuna application
- implementing / Tuna application
- Two-factor authentication (2FA)
- about / What is 2FA?, Evolution of user authentication
- user authentication, evolution / Evolution of user authentication
- benefits / Why 2FA?
- working / How does it work?
- cloud-based solution / How does it work?
- on-premise solution / How does it work?
- challenges / Challenges
- using, in blockchain / Blockchain for 2FA
- blockchain, using / How can blockchain transform 2FA?
- solution architecture / Solution architecture
- lab / Lab
- types, DDoS attacks
- network resources, targeting / Attacks targeting network resources
- server resources, targeting / Attacks targeting server resources
- application resources, targeting / Attacks targeting application resources
U
- UK NCSS program
- URL / The United Kingdom (UK)
- use cases, blockchain
- FinTech / Business adaptation
- Healthcare / Business adaptation
- cyber security / Business adaptation
- User datagram protocol (UDP) flood / User datagram protocol (UDP) flood
V
- Verisign / Registries, registrars, and registrants
- virtual private network (VPN) / Live attack execution
W
- WannaCry /
- weaponization / Live attack execution, Weaponization
- web app
- versus dApp / Web app versus dApp
Z
- zero-trust approach
- about / The zero-trust approach
- sensitive data, identifying / The zero-trust approach
- sensitive data, classifying / The zero-trust approach
- data-flow, mapping / The zero-trust approach
- network architect / The zero-trust approach
- policy base, creating / The zero-trust approach
- continuous monitoring / The zero-trust approach