Article Critique 6

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

1974

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by MateRook1443

Report
*Students should type directly into the chart below. ARTICLE CRITIQUE Parts of Article Critique Student Responses Your First and Last Name Afsha Farnaz Author(s) First and Last Name Paul Taylor, Tooska Dargahi, Reza Parizi and Ali Dehghantanha. Article Title A systematic literature review of blockchain cyber security Publication Date: Year (within last 10 years) 2020 Journal Name Digital Communications and Networks Journal Volume two Journal Number 6 Journal Pages (range, ex. 1-10) 147-156 Article Abstract: highlight and copy the exact abstract from the article chosen and paste the abstract here Since the publication of Satoshi Nakamoto’s white paper on Bitcoin in 2008, blockchain has slowly become one of the most talked about methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research systematically identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a breakdown of the most adopted blockchain security applications. Our findings depict that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public key
*Students should type directly into the chart below. cryptography, web applications, certification schemes and the secure storage of personally identifiable information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space. Takeaway: In a bulleted list, write complete sentences about three things you have learned from the article. *The takeaway should be written in your own words with no similarity. One of the takeaways is that blockchain technology has become outstanding as an ideal solution to blockchain’s security challenges as it is tamper prove and resistant. The second takeways is that blockchain itself is not immune to cyber attacks and vulnerabiltiies. There is need for regular assessment and monitoring. The collaboration of blockchain with other solutions such as Internet of Things (IoT) and Artificial Intelligence (AT). Reference Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic literature review of blockchain cyber security. Digital Communications and Networks , 6 (2), 147-156.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help