Abstract
Computer exploitation is on the rise. Advanced adversaries are becoming more capable and destructive. Organizations must become increasingly effective at mitigating their information security risks. Effective cybersecurity is more important than ever as immeasurable amounts of personal and potentially incriminating data are currently stored in websites and social media platforms. The Internet is full of powerful hacking tools and hackers are using them extensively to cause damage to individuals and organizations. Attacks are becoming stealthier, having a greater financial impact, and causing broad damage. Reports of organizations being hacked and suffering reputational damage have become commonplace. According to Symantec, cybersecurity threats in some categories rose to 600% in 2017 (Symantec 2019). A continuous stream of cybersecurity breaches in 2017 underscores our inability to provide adequate security for our online information. Organizations are spending significant time, financial, and human resources to combat cyber threats and combat cyberattacks, however some companies are still getting compromised. The traditional prevention approach to security architecture has failed to prevent hackers from intrusions. Blockchain technology is that proactive approach to security needed to enhance the capabilities of organizations to detect and prevent threats that will inevitably slip through existing defenses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kinsella B (2019) CIRP reports that U.S. smart speaker installed base rose to 66 million in 2018 with Amazon holding 70% share compared to google and apple. Voicebot.ai. February 5. Retrieved April 19, 2019, from https://voicebot.ai/2019/02/05/cirp-reports-that-u-s-smart-speaker-installed-base-rose-to-66-million-in-2018-with-amazon-holding-70-share-compared-to-google-and-apple/
Marr B (2018) 35 amazing real world examples of how Blockchain is changing your world. Forbes. September 25, Retrieved March 12, 2019, from https://bernardmarr.com/default.asp?contentID=1302
Marotti A (2019) Why are you looking at me? I see you watching me Smart devices like Nest getting hacked in digital home invasion. Chicago Tribune. February 8. Retrieved April 16, 2019, from https://www.chicagotribune.com/business/ct-biz-nest-cameras-hacked-20190204-story.html
Singh N (2018) Real world Blockchain use cases – 46 Blockchain applications. July 6 Retrieved, March 25. https://101blockchains.com/blockchain-applications/
Symantec (2019) Internet security threat report. Vol 24, February. Retrieved March 25, 2018, from https://img03.en25.com/Web/Symantec/%7B1a7cfc98-319b-4b97-88a7-1306a3539445%7D_ISTR_24_2019_en.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Attaran, M., Gunasekaran, A. (2019). Blockchain and Cybersecurity. In: Applications of Blockchain Technology in Business. SpringerBriefs in Operations Management. Springer, Cham. https://doi.org/10.1007/978-3-030-27798-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-27798-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27797-0
Online ISBN: 978-3-030-27798-7
eBook Packages: Business and ManagementBusiness and Management (R0)