{"id":30198,"date":"2019-06-07T09:09:17","date_gmt":"2019-06-07T07:09:17","guid":{"rendered":"https:\/\/staging.esa-automation.com\/en\/new-network-remote-io-esaware-discover-all-features-3-2-2-2\/"},"modified":"2024-11-08T22:04:14","modified_gmt":"2024-11-08T21:04:14","slug":"new-network-remote-io-esaware-discover-all-features-3-2-2-2","status":"publish","type":"post","link":"https:\/\/staging.esa-automation.com\/en\/how-blockchain-is-changing-cybersecurity\/","title":{"rendered":"How Blockchain is changing Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p><\/p>\n<p>[vc_row][vc_column][vc_column_text]After finance, <strong>blockchain<\/strong> has approached the complex field of online security. Due to the increasing number of attacks (+ 31% in 2018, source <a href=\"https:\/\/clusit.it\/\" target=\"_blank\" rel=\"noopener\">Clusit<\/a>), investing in <strong>cybersecurity<\/strong> has become a priority for all the biggest companies.<br \/>\nAmong the available technologies, blockchain-based solutions are proving particularly effective and promising. So much so that even NASA has decided to implement blockchain technology in order to increase IT security and <strong>prevent cyberattacks<\/strong>.<br \/>\n<!--more--><\/p>\n<h2>What is blockchain<\/h2>\n<p>Blockchain is a technology that functions as a <strong>shared and immutable register<\/strong> of information relevant to a given network. This digital register is structured as a chain of blocks that anyone can access but no one can modify, as they are protected by cryptography.<br \/>\nAlthough not editable, blockchain is not static. It\u2019s possible to add new blocks once their reliability has been verified by consent. Through this process it\u2019s certain that the chain stays:<\/p>\n<ul>\n<li><strong>Decentralized<\/strong>: since the register is organized in blocks (on the different nodes of the network), there is no single depository of information.<\/li>\n<li><strong>Safe and trackable<\/strong>: you can trace with certainty who generated the events.<\/li>\n<li><strong>Unquestionable<\/strong>: the reliability of the information is verified and decided through a mechanism of consent, therefore it is never unilateral.<\/li>\n<\/ul>\n<h2>Blockchain and cybersecurity: the main advantages<\/h2>\n<p>How does this apply to <a href=\"https:\/\/staging.esa-automation.com\/en\/cyber-security-as-a-prerequisite-for-the-industry-4-0\/\">cybersecurity<\/a>? First of all, blockchain <strong>decentralizes sensitive data<\/strong>. The information circulating on the web today has enormous value. For this reason, it\u2019s often the objective of cyber attacks.<br \/>\nAs written above, blockchain is a decentralized register of data. That is, instead of using centralized storage, blockchain-based solutions store data on multiple nodes. This makes things harder for cybercriminals, who can no longer access entire databases from a single access point.<br \/>\nAnother way blockchain will transform cybersecurity is by <strong>making IoT devices &#8220;smarter&#8221;<\/strong>. According to Joseph Pindar, co-founder of the Trusted IoT Alliance, thanks to blockchain technology, the systems and devices of a plant can make safety decisions independently, without a central authority.<br \/>\nFor example, they can form a shared consensus on ordinary events within a network and block nodes that behave differently and suspiciously. This would make it harder for hackers to exploit the vulnerability of peripheral devices to break into a network.<br \/>\nFinally, blockchain is useful to <strong>prevent DNS attacks<\/strong>. Since DNS is mostly centralized, it is easier to break the connection between the website name and the IP address. In fact, hackers use this weak point to make sites unusable or redirect people to scam pages.<br \/>\nIn a blockchain-based system, decentralization would allow domain information to be stored in a distributed registry. In addition, the connection can be powered by immutable intelligent contracts.<br \/>\nIn an IoT based context of Industry 4.0, it\u2019s clear how blockchain is an important solution that can improve cybersecurity in production.<br \/>\n<a href=\"https:\/\/staging.esa-automation.com\/en\/nis-directive-and-cyber-security-in-esa-automation-products\/\">Discover ESA&#8217;s cybersecurity solutions<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>After finance,\u00a0<strong>blockchain<\/strong>\u00a0has approached the complex field of online security. Investing in\u00a0<strong>cybersecurity<\/strong>\u00a0has become a priority for all the biggest companies&#8230;<\/p>\n","protected":false},"author":1830,"featured_media":18383,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,164,3],"tags":[],"class_list":["post-30198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-industry-4-0-and-iot","category-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/posts\/30198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/users\/1830"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/comments?post=30198"}],"version-history":[{"count":0,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/posts\/30198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/media\/18383"}],"wp:attachment":[{"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/media?parent=30198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/categories?post=30198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.esa-automation.com\/en\/wp-json\/wp\/v2\/tags?post=30198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}