Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

IIEC Alumni

IIEC Alumni Logo IIEC Alumni Logo

IIEC Alumni Navigation

  • Alumni Learning
  • Get Qualified!
  • Programs
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Alumni Learning
  • Get Qualified!
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Latest Activity
  • Trends
  • Users
  • Help
  • Alumni Learning
  • Get Qualified!
  • Programs
Programs/ Questions/Q 905
Next
In Process
Nick
Nick

Nick

  • 1 Question
  • 0 Answers
  • 0 Best Answers
  • 1 Point
View Profile
  • 1
Nick
Blockchain
Asked: March 4, 20192019-03-04T13:07:02+00:00 2019-03-04T13:07:02+00:00

What are possible Information risks factor of Blockchain and are the assurance measures in place?

  • 1

What are possible Information risks factor of Blockchain and are the assurance measures in place?

[email protected]
  • 1 1 Answer
  • 447 Views
  • 0 Followers
  • 0
Answer
Share
  • Facebook

    1 Answer

    • Voted
    • Oldest
    • Recent
    1. Emi Hanado

      Emi Hanado

      • 33 Questions
      • 32 Answers
      • 1 Best Answer
      • 58 Points
      View Profile
      Emi Hanado
      2019-03-05T02:00:47+00:00Added an answer on March 5, 2019 at 2:00 am

      Here are some key know risk factors

      Blockchain efficiency:
      For instance, the most popular consensus mechanism used in blockchain is Proof of Work, which the researchers call a “waste of computing resources.” They say there are efforts to develop more efficient and hybrid consensus mechanisms that combine PoW and Proof of Stake (PoS). In addition, blockchains will produce a lot of data — block information, transaction data, contract bytecode — that may be outdated and useless. “There are a lot of smart contracts containing no code or totally the same code in Ethereum, and many smart contracts are never be executed after its deployment. Efficient data cleanup and detection mechanism are desired to improve the execution efficiency of blockchain systems.”

      “51% vulnerability:”
      Blockchain “relies on the distributed consensus mechanism to establish mutual trust. However, the consensus mechanism itself has 51% vulnerability, which can be exploited by attackers to control the entire blockchain. More precisely, in PoW-based blockchains, if a single miner’s hashing power accounts for more than 50% of the total hashing power of the entire blockchain, then the 51% attack may be launched. Hence, the mining power concentrating in a few mining pools may result in the fears of an inadvertent situation, such as a single pool controls more than half of all computing power.”

      Private key security: ”
      When using blockchain, the user’s private key is regarded as the identity and security credential, which is generated and maintained by the user instead of third-party agencies. For example, when creating a cold storage wallet in Bitcoin blockchain, the user must import his/her private key.” An attacker could “recover the user’s private key because it does not generate enough randomness during the signature process. Once the user’s private key is lost, it will not be able to be recovered. Since the blockchain is not dependent on any centralized third-party trusted institutions, if the user’s private key is stolen, it is difficult to track the criminal’s behaviors and recover the modified blockchain information.”

      Criminal activity and cybersecurity
      This is a continuous topic although Blockchain may be the safer option than centalized option.
      “Through some third-party trading platforms that support Bitcoin, users can buy or sell any product. Since this process is anonymous, it is hard to track user behaviors, let alone subject to legal sanctions.” Frequent criminal activities with Bitcoin include ransomware, underground markets and money laundering.

      Double spending. ”
      Although the consensus mechanism of blockchain can validate transactions, it is still impossible to avoid double spending, or using the same cryptocurrency multiple times for transactions. The attacker can exploit the intermediate time between two transactions’ initiation and confirmation to quickly launch an attack.”

      Transaction privacy leakage.
      Unfortunately, the privacy protection measures in blockchain are not very robust,” Li and his co-authors state. “Criminal smart contracts can facilitate the leakage of confidential information, theft of cryptographic keys, and various real-world crimes (e.g., murder, arson, terrorism, etc.)”

      Vulnerabilities in smart contracts. “As programs running in the blockchain, smart contracts may have security vulnerabilities caused by program defects.” For example, one study found that 8,833 out of 19,366 Ethereum smart contracts are vulnerable to bugs such as transaction-ordering dependence, timestamp dependence, .mishandled exceptions, and .re-entrance vulnerability.”

      Under-optimized smart contracts:
      “When a user interacts with a smart contract deployed in Ethereum, a certain amount of “gas” is charged. Gas can be exchanged with “Ether,” which is the cryptocurrency in Ethereum. This results in “useless-code related patterns,” and “loop-related patterns.” This consists of “dead code, opaque predicate, and expensive operations in a loop.”

      Under-priced operations:
      “Ethereum sets the gas value based on the execution time, bandwidth, memory occupancy, and other parameters. In general, the gas value is proportional to the computing resources consumed by the operation. However, it is difficult to accurately measure the consumption of computing resources of an individual operation, and therefore some gas values are not set properly. For example, some IO-heavy operations gas values are set too low, and hence these operations can be executed in quantity in one transaction. In this way, an attacker can initiate a Denial of Service attack on Ethereum.”

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp

    Leave an answer
    Cancel reply

    You must login to add an answer.

    Forgot Password?

    Sidebar

    Related Questions

    • avabloom

      Pi Coin Price Prediction 2025 - Pi Coin Mining Vs BDAG Mining

      • 0 Answers
    • Anonymous

      What are the key differences between Robinhood and Coinbase when it comes to cryptocurrency trading?

      • 0 Answers
    • haileyblogger

      BlockDAG: Ethereum Classic Prediction

      • 0 Answers
    • Melindamuh

      online loans

      • 0 Answers
    • pulsa303hoki

      PULSA303 Login Judi Slot PGSOFT Deposit EWallet Pasti Terbuka Resmi

      • 0 Answers
    • peteralston112

      Do my Online Class for Me

      • 0 Answers
    • AgnesAsces

      free online casino

      • 0 Answers
    • okta388hoki

      OKTA388 Link Alternatif Judi Games Slot RTP Live Nomor 1 Terbaik

      • 0 Answers
    • bigslot188hoki

      BIGSLOT188 Link Daftar Judi Slot Jakpot Pasti Lancar Terlengkap

      • 0 Answers
    • 88megahoki

      88MEGA Link Judi Bola CMD368 Deposit Gopay Pasti Terbuka Terbesar

      • 0 Answers
    Ask A Question

    Stats

    • Questions 35k
    • Answers 2k
    • Best Answers 10
    • Users 52k

    Recent posts

    • Active Learning • The Definitive Guide
      • On: February 14, 2019
      • Comment: 1

      Active Learning • The Definitive Guide

    • How Can Businesses Track Employee Digital Skills?
      • On: February 3, 2019
      • Comments: 6

      How Can Businesses Track Employee Digital Skills?

    Explore Our Blog

    Trending Topics

    academic ai anxiety therapist in palm beach blockchain business cara meng­gu­gur­kan kan­dun­gan fleet gps tracking solutions gps tracking devices gps tracking solutions iiot industry4.0 industry 4.0 iot leon288 mental health therapist in palm beach ml obat penggugur kandungan robotics therapist in palm beach gardens vidio bokep jepang vidio bokep jepang hd

    Explore

    • Alumni Learning
    • Get Qualified!
    • Questions
      • New Questions
      • Trending Questions
      • Must read Questions
      • Hot Questions
    • Polls
    • Latest Activity
    • Trends
    • Users
    • Help

    Footer

    IIEC Alumni

    Alumni | IIEC Business School

    Alumni is the #1 Active Learning Platform (ALP) for Qualification in Future Skills, which help you improve your knowledge, connect with other people, and earn certifications. Learning, Sharing, Growing, all in one place.

    About Us

    • Meet The Team
    • Blog
    • About Us
    • Contact Us

    legal Stuff

    • Terms of Use
    • Privacy Policy
    • Cookie Policy

    Help

    • Knowledge Base
    • Support

    Social Media

    © 2021 Discy. All Rights Reserved
    With Love by 2code.