Blockchain Development Discussion Responses

docx

School

Chamberlain College of Nursing *

*We aren’t endorsed by this school

Course

1

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by AdmiralHare1908

Report
Blockchain Development Discussion Responses Post 1 (Omer) Thank you for the discussion post submitted Omer, I found it insightful and comprehensive regarding the significance of securing Blockchain technology. You have clearly emphasized on the importance of securing sensitive data even while using blockchain technology or cloud computing. I disagree with you that storing data in the public cloud be unsafe, there are several security measures that can be implemented to secure the data for example, selecting a cloud service provider that facilitates data encryption and using two-factor authentication. I agree with you on the effectiveness of using HTTPS connection in securing data in blockchain. HTTPS utilizes the encryption protocol in encrypting the data. Question: How would you protect blockchain data not on the app? Post 2 (Mohammed) Thank you for the post Mohammed. The description on spoofing as it is related to cryptocurrency was comprehensive. I agree with you that the cryptocurrency spoofing threats can discourage investors from purchasing cryptocurrencies. Thus the importance of mitigating spoofing threats. I agree with you about indexing the spoofed addresses inside the trusted listing at the smart contract. I also agree with you regarding the measures taken to counter spoofing threats by blocking malicious attackers with motive to initiate a DDoS attack using the SDN controller used to maintain synergy between the blockchain environment and the access of records. Question: How can blockchain be used to track cryptocurrencies used for illegal actitivities?
Post 3 (Tharun) Thank you for the discussion post Tharun. I found the description of the eclipse attack to be comprehensive, simple and to the point. In eclipse attacks, malicious parties try to isolate the victim from the network before initiating the attack. I agree with you that smart contracts can be used to prevent eclipse attacks. Smart contracts are integrated within the ledgers and ensure that only peers within the chain are able to access information, additionally, it makes it impossible to alter information within the blockchain. This guarantees that only authorized parties can have access to the information on the ledger. Question: How secure is public blockchain compared to private blockchain?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help