Company Logo



Business opinion cryptocurrencies on the Blockchain is Vulnerable to Attacks, but not “Data”

Cryptocurrencies on the Blockchain is Vulnerable to Attacks, but not “Data”


Opinion

Cryptocurrencies on the Blockchain is Vulnerable to Attacks, but not “Data”

The blockchain technology is being used to protect data from being tampered. Even though the data serves an important component of most businesses today, yet ensuring that data remains safe, secure, private and authentic has become a real challenge.

John Zanni, President of the Acronis Foundation says, “We believe that blockchain technology will be transformative in the tech and IT sector in the coming years, similar to what the internet did for the world back in the 90s and early 2000s… We started a few years ago working with the Ethereum blockchain to see how to better protect data. Today, part of our storage and backup software lets users notarize any digital data and put that fingerprint on the blockchain to ensure it can’t be tampered with.

Equifax cybersecurity breach can better illustrate the severity of the impact when data gets compromised. The breach occurred in September 2017 compromising sensitive information like personal data and credit card credentials of at least half the U.S. population.

Data tampering is also one of the biggest challenges in cybersecurity that businesses face these days. “Authenticity of data is actually one of the most important factors when it comes to cyber protection. Data can always be changed and modified… Blockchain technology can be used so that data can be signed with a digital signature. That digital signature, called hash, can then be stored on either a public or private blockchain ledger, which is highly immutable, making it possible to check if data was modified at any given time,” said the CEO and Founder of Acronis, Serguei Beloussov in an interview.

Blockchain technology, when it comes to handling humungous data volume, can be looked at as a distributed database that maintains the growing list of data transaction records. The distributed nature of this technology helps prevent tampering and data revisions because every transaction on this network is transparent and recorded in all participating ledgers. There is no ‘one official copy’ and timestamps to records make the data remain authentic.

Acronis applies blockchain technology to encrypt the data input files producing an output file containing hash – the product of a hashing algorithm. The hash acts as a digital fingerprint that gets modified every time the data it protects is tampered with. The hashing algorithm works one way, and hence it is impossible to determine the original input file from the output file alone.

“… Blockchain technology today focuses mainly on cryptocurrency and Fintech… the world needs to look beyond that… on how businesses and individuals can take advantage of this technology. The day someone figures out how small businesses can apply blockchain technology in a multitude of applications is the day it will really flourish,” says Zanni.


Business News


Recommended News


Most Featured Companies

ciobulletin-aatrix software.jpg ciobulletin-abbey research.jpg ciobulletin-anchin.jpg ciobulletin-croow.jpg ciobulletin-keystone employment group.jpg ciobulletin-opticwise.jpg ciobulletin-outstaffer.jpg ciobulletin-spotzer digital.jpg ciobulletin-virgin incentives.jpg ciobulletin-wool & water.jpg ciobulletin-archergrey.jpg ciobulletin-canon business process services.jpg ciobulletin-cellwine.jpg ciobulletin-digital commerce bank.jpg ciobulletin-epic golf club.jpg ciobulletin-frannexus.jpg ciobulletin-growth institute.jpg ciobulletin-implantica.jpg ciobulletin-kraftpal technologies.jpg ciobulletin-national retail solutions.jpg ciobulletin-pura.jpg ciobulletin-segra.jpg ciobulletin-the keith corporation.jpg ciobulletin-vivolor therapeutics inc.jpg ciobulletin-cox.jpg ciobulletin-lanner.jpg ciobulletin-neuro42.jpg ciobulletin-Susan Semmelmann Interiors.jpg ciobulletin-alpine distilling.jpg ciobulletin-association of black tax professionals.jpg ciobulletin-c2ro.jpg ciobulletin-envirotech vehicles inc.jpg ciobulletin-leafhouse financial.jpg ciobulletin-stormforge.jpg ciobulletin-tedco.jpg ciobulletin-transigma.jpg ciobulletin-retrain ai.jpg
ciobulletin-abacus semiconductor corporation.jpg ciobulletin-agape treatment center.jpg ciobulletin-cloud4wi.jpg ciobulletin-exponential ai.jpg ciobulletin-lexrock ai.jpg ciobulletin-otava.jpg ciobulletin-resecurity.jpg ciobulletin-suisse bank.jpg ciobulletin-wise digital partners.jpg ciobulletin-appranix.jpg ciobulletin-autoreimbursement.jpg ciobulletin-castle connolly.jpg ciobulletin-cgs.jpg ciobulletin-dth expeditors.jpg ciobulletin-form.jpg ciobulletin-geniova.jpg ciobulletin-hot spring it.jpg ciobulletin-kirkman.jpg ciobulletin-matrix applications.jpg ciobulletin-power hero.jpg ciobulletin-rittenhouse.jpg ciobulletin-stt logistics group.jpg ciobulletin-upstream works.jpg ciobulletin-x2engine.jpg ciobulletin-kastle.jpg ciobulletin-logix.jpg ciobulletin-preclinical safety (PCS) consultants ltd.jpg ciobulletin-xcastlabs.jpg ciobulletin-american battery solutions inc.jpg ciobulletin-book4time.jpg ciobulletin-d&l education solutions.jpg ciobulletin-good good natural sweeteners llc.jpg ciobulletin-sigmetrix.jpg ciobulletin-syncari.jpg ciobulletin-tier44 technologies.jpg ciobulletin-xaana.jpg

Latest Magazines

© 2024 CIO Bulletin Inc. All rights reserved.