Professional Documents
Culture Documents
Blockchain Presentation
Blockchain Presentation
N
• SYED ABDULLAH (21L-5311)
• SAFWAN AKBAR (21L-7556)
• UMER HABIB (21L-5199)
• FATIMA SALMAN (21L-7587)
INTRODUCTION
A blockchain is essentially a digital ledger of transactions that is
duplicated and distributed across the entire network of computer
systems
Every time a new transaction occurs on the blockchain, a record of
that transaction is added to a participant’s ledger
REASON FOR
SO MUCH Bitcoin was designed to solve
Most normal databases have
someone in charge who can
HYPE this problem by using a
specific type of database called
change the entries (e.g. giving
themselves a million X
a blockchain.
AROUND dollars).
BLOCKCHAIN
Bitcoins can’t be faked, hacked
Blockchain is different because
or double spent – so people
nobody is in charge; it’s run by
that own this money can trust
the people who use it.
that it has some value.
HOW BLOCKCHAIN
WORKS
EACH
TRANSACTION
RECORDED AS
BLOCK OF DATA
TRANSACTIONS
DATA BLOCK
FORMED TOGETHER
RECORDS
TO FORM AN
INFORMATION OF
IRREVERSIBLE
YOUR CHOICE
CHAIN
EACH BLOCK
BLOCKS CONFIRM
CONNECTED TO
EXACT SEQUENCE
THE ONES BEFORE
OF TRANSACTIONS
AND AFTER IT
USES OF BLOCKCHAIN
Consensus on data
accuracy is required from No one, not even a
GREATER all network members, and
all validated transactions
system administrator, can
delete a transaction, and
SECURITY are immutable because
they are recorded
chances of hacking are
reduced
permanently
CE OF
information
the better
AIN accounts,
production and
much more
details of a
transaction end
to end
INTRODUCTIO
N TO
BLOCKCHAIN
SECURITY
BLOCKCHAIN SECURITY
PUBLI PRIVA
connected consensus
computers to through
validate "selective
transactions endorsement"
C TE
Only members
Bitcoin well-
with special
known example;
access and
achieves
permissions can
consensus through
maintain the
"bitcoin mining"
transaction ledger
THREATS
TO
BLOCKCH
AIN
• PHISHING ATTACKS:
Phishing is a scamming attempt to attain a user's credentials. Fraudsters send wallet key owners emails designed to look as
though they're coming from a legitimate source. The emails ask users for their credentials using fake hyperlinks. Having
access to a user's credentials and other sensitive information can result in losses for the user and the blockchain network.
• ROUTING ATTACKS:
Blockchains rely on real-time, large data transfers. Hackers can intercept data as it's transferring to internet service providers. In a routing
attack, blockchain participants typically can't see the threat, so everything looks normal. However, behind the scenes, fraudsters have
extracted confidential data or currencies.
• SYBIL ATTACKS:
In a Sybil attack, hackers create and use many false network identities to flood the network and crash the system. Sybil refers to a famous
book character diagnosed with a multiple identity disorder.
• 51% ATTACKS:
Mining requires a vast amount of computing power, especially for large-scale public blockchains. But if a miner, or a group of miners, could
rally enough resources, they could attain more than 50% of a blockchain network's mining power. Having more than 50% of the power means
having control over the ledger and the ability to manipulate it.
CYBERATTACKS TAKEN PLACE