fbpx
Recently I had shared a number of posts on Blockchain technology.
 
Yes, I am aware of some basic benefits of Blockchain. For example,
Blockchain works as a shared system of record among participants on a business network, eliminating the need to reconcile disparate ledgers. It is distributed!
 
Each member of the network has access rights so that confidential information is shared on a need-to-know basis.
Consensus is required from all network members and all validated transactions are permanently recorded. No one, not even a system administrator, can delete a transaction. That makes the data secure.
 
 
 
 
There is no doubt that Blockchain is an highly promising technology. There is a huge debate about its ramifications and usage to cure a number of Cybersecurity issues. A lot of pioneering attempts are being made to harness it to some serious cybersecurity and information security related issues.
 
Since I am not an expert on Blockchain technology, I would refrain from making any certain opinion about it. I would like to keep my fingers crossed, as how blockchain would turn up in the grand scheme of information security.
 
However, I came across of an interesting graphic.
It was the graphic depiction of Howard Poston's Research Paper/Article which is titles as
'Mapping the OWASP Top Ten to Blockchain'
 
Huston says that--
 
The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilities in blockchain systems.
 
While the OWASP Top Ten List is designed to describe the vulnerabilities that web application developers face, nine of ten of the OWASP vulnerabilities also apply to blockchain systems. The exception, XML External Entities (XXE), is not applicable due to the lack of use of XML in blockchain.
 
 
[ADDITIONAL NOTE]
This note is for those readers who have advanced level of knowledge in Blockchain technology.
 
While the OWASP Top Ten is a good starting point when developing blockchain systems and smart contracts, the blockchain ecosystem creates additional potential security issues. The Decentralized Application Security Project (DASP) maintains a similar Top Ten list geared toward educating smart contract developers about the most common mistakes made on the Ethereum platform. Understanding how the blockchain ecosystem works and the security assumptions made at each level are also a vital part of ensuring holistic distributed ledger security.
-
For those who are interested and want to read the full text of this paper, kindly write YES in the comment section, I would send you the PDF of this paper.
 
 

This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

30,000+ professionals are following her on Facebook and  mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM