This paper explores the use of blockchain technology in network security and its benefits in securing network infrastructure. It discusses the implementation and deployment of blockchain technology, as well as its impact on security within network systems. The paper also provides findings and recommendations for future research.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Advanced Network and Infrastructure Security 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT Securityisbasedonthefundamentalcomponentintermofcomputingandnetworking technology. It is everything of network designing, planning, building and operating a network. It has become more important to protect personal computer users, organizations. With advent of internet, security is becoming a major concern due to intellectual property which can easily acquire through internet. Therefore, networking infrastructure worldwide and needed to different security mechanism. Furthermore, research study is adapting the block chain technology in term of network infrastructure security. This paper looked at several use of block chain in network security within industry. In order to examine the way to highlight through study which block chain can afford security. Lastly, the paper recommended that future researcher focus on the blockchain on which to develop applications and allow for integration, uniformity among solution. 2
Contents ABSTRACT....................................................................................................................................2 INTRODUCTION...........................................................................................................................4 Related work................................................................................................................................4 Research methodology.................................................................................................................5 Result and analysis......................................................................................................................5 CONCLUSION................................................................................................................................5 REFERENCES................................................................................................................................7 3
INTRODUCTION Network security management is another kind of situation or condition which require for growing use of internet. Many industries are essential to concern about the basic security aspects. In order to prevent against malicious attack from hacking and spamming. IT professional has adapted the blockchain as a revolutionary technology. It is the set to change future of computing and disrupt several industries with more innovative solution. This technology is based on the immutable and distributed (You, Oh and Lee, 2018). Thus, practically applicable in many environment or culture. The modern technology has gained massive appeal from translating cryptographically chained blocks. Therefore, network infrastructure can be highly beneficial in offering solution by adapting block chain technology. In order to secure or protect in proper manner. Related work According toGritzalis,Theocharidou and Stergiopoulos (2019) the blocks in blockchain can never be modified since doing and affects the integrity of all subsequent blocks. It implies that causes to be taken when adding blocks to chain and ensure that there will be require to change it. On the other hand, blockchain network that can add more block by broadcasting it to another nodes. It allows them to see entire block chain at specific time intervals. The work is generally set of complex calculation whereas each nodes maintain the security aspects in proper manner. This can be done by computational power which always supports for maintaining network and infrastructure of industries. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Blockchain has to comprimse with large percentage of node that need to be stored with decentralise piece of information or data. It is the simplest way to find out the better security options. In order to fullfill requirement of network infrastructure system in proper manner. Research methodology The researcher will use the qualitative analysis of secondary data which help for evaluating the applicable of block chain technology in today’s industry. Furthermore, it will review of 30 different research studies on the basis of blockchain technology. This research paper will mainly focused on the two different aspects of highlighted conceptual things (Mwiki, Dargahi and Choo, 2019). To begin with, it will look at the implementation of blockchain technology in network infrastructure. In another way, it will look at the deployment of blockchain technology and how it will provide better solution in term of security within network system. Furthermore, it will be focused on the research findings and recommendation from analysed the paper. It will be used to discuss on how blockchain technology can afford security in network infrastructure. Result and analysis The assessment of 30 different studies that mainly showing blockchain technology which becomeviableinnetworkinfrastructuresecurity.Ithassummarisedthefindingwhere 5
blockchain technology useful for handling the overall processing. It should consider the public key infrastructure, data privacy claim most of recent security implementations. Furthermore, it is mainly focused on the blockchain security which become sustainable since there are various devices. They have a weak security configuration and being chances of hacked into network. Researcher is mainly focused on looking at way in which devices can be secured and protected from other attackers. This technology is improved the security and privacy even through existing solution offer commendable level of protection. There are still prone to be failure. CONCLUSION As per analysis, it has been discussed about blockchain technology that continues to evolve and find the security aspects within network infrastructure protection. It has been studied and applied the innovative technology. It is highly practical in addressing current security challenges in the network. Therefore, this paper has evaluated the current applicability of blockchain technology. It has been observed that Blockchain technology adapting the security within network infrastructure and data. As discussion done by secure devices which become more reliable authentication and data transfer mechanism. In this way, it can prevent hackers from breaching into multiple devices that directly connected with network. It can be said that well organised manner to secure networks by using blockchain technology. Moreover, it has recommended that future investigator look into practically way to provide the better security solution. 6
REFERENCES Book and Journals Gritzalis, D., Theocharidou, M. and Stergiopoulos, G., 2019.Critical Infrastructure Security and Resilience. Springer, Cham. Mwiki, H., Dargahi, T. and Choo, K.K.R., 2019. Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: APT28, RED October, and Regin. InCritical Infrastructure Security and Resilience(pp. 221-244). Springer, Cham. You, Y., Oh, J. and Lee, K., 2018. Advanced approach to information security management system utilizing maturity models in critical infrastructure.KSII Transactions on Internet & Information Systems,12(10). 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.