logo

Cryptocurrency and Cryptocurrency Hijacking

   

Added on  2023-04-20

9 Pages1276 Words419 Views
Cryptocurrency and Cryptocurrency hijacking 1
CRYPTOCURRENCY AND CRYPTOCURRENCY HIJACKING
Student’s name
Name of the University
Date of submission

Cryptocurrency and Cryptocurrency Hijacking 2
Cryptocurrency and Cryptocurrency Hijacking
In the current world, Security of financial organizations has become the most significant
issue and concern of all the parties conducting the transaction over the internet. This has caused a
lot of insecurity in these organizations and parties involved in transaction form attacks and loss
of their good, services offered and money paid or stolen in the process. The emergence of
cryptocurrency systems has led to further security, safe transactions and improvement of
integrity in the systems.
Cryptocurrencies are global decentralized systems designed on a blockchain technology
to generate and regulates the use of the digital currency exchanged digitally without any
limitation of supply. Blockchain technology keeps cryptocurrencies on track irrespective of if
they are being held in a digital wallet or used in the transaction (Hileman & Rauchs 2017).
How cryptocurrencies systems work
The cryptocurrencies require an infrastructure that ensures security for the effective
running of the system. It has a ledger, where all transactions that are made visible for all the
users thus improving integrity and trust among the parties. Ledger provides a list of entries in a
database that cannot be changed by any party without satisfying certain conditions. Ledger and
the cryptocurrency blockchain are decentralized meaning running without the interference of
outside parties (Higbee 2018).

Cryptocurrency and Cryptocurrency Hijacking 3
After the purchase, the transaction undergoes through a verification process after which is
recorded in the history of operations on the blockchain public ledger and the miner is given a
reward for their efforts based on the cryptocurrency.
Cryptocurrency Hijacking
Cryptocurrency hijacking is a type of an attack that allows websites or hackers to intrude
into the system resources of remote computer users where it gains access into a server or a web
page to take advantage of the user's resources.
How to Protect Against Cryptocurrency Hijacking
Testing
There are tools and methods available to test web browsers to confirm that anti-crypto-
jacking tools are working. e.g., cryptojackingtest.com. The use of other technologies of testing
like browser and gateway solutions can also help limit the risk of cryptocurrency attacks.
Antivirus software.
Use of antivirus recognizes and protects a computer against attack and malware,
providing the user with the ability to detect and mitigate potentially malware and intrusion before
they cause any damage in the system.
Firewall installation

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Trends in Cybercrime | Report
|4
|3538
|16

Academic Writing Sample: (PDF) An Analysis of Cryptocurrency, Bitcoin, and the Future
|7
|1814
|49

Key Ideas and Technology Behind Crypto Currencies
|14
|3741
|23

Blockchain FINTECH and BTC Name: Aakash K V
|29
|2822
|16

The Concept of Blockchain Technology
|8
|1826
|323

Assignment on Trends in Cybercrime
|13
|3063
|21