Benefit 1: Improved Security

Slides:



Advertisements
Similar presentations
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Advertisements

ICT at Work Banking and Finance.
Computer Science 162 Section 1 CS162 Teaching Staff.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Secure Electronic Transaction (SET)
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Chapter 8 Configuring and Managing Shared Folder Security.
IS ANONYMOUS CURRENCY A GOOD IDEA? BY ADAM LASSWELL.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Information Systems Design and Development Security Precautions Computing Science.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Banking Services Consumer Education Chapter 7. How Banks Work 7.1.
Credit & Debit Cards: Advantages and Disadvantages
What is: Ionicoin Digital Currency LTD?
ELECTRONIC PAYMENT SYSTEM
Welcome POS Synchronize Concept 08 Sept 2015.
The Revolutionary Benefits Of Blockchain
Raihana Ferdous, Vallipuram Muthukkumarasamy
File System Implementation
Distributed Financial Technology in Payments
Cryptocurrencies by.
How DLTs might impact the financial sector
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
The Changing Face of Digital Identity
Cloud Storage - an introduction
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Introduction to Networking
Introduction to Computers
(1888 PressRelease) First Decentralized Private Communication Solution
So what is Blockchain anyway?
Blockchain Adrian Zaragoza.
Deanonymization of Clients in Bitcoin P2P Network
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
5 Benefits of Blockchain for Startups - IQVIS
Get Solution at Trezor Support Phone Number
Article Source- Toll Free
START The way we trust is changing Presentation for Thursday at IAAO
SOLUTION LAND TITLES.
Strategizing Testing for Blockchain /Distributed Ledger Products
Breaking through with Blockchain
Shopping experience! Is it safe to pay online? Ian Ramsey
Nessus Vulnerability Scanning
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Life skill presentation
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Focus Group 3: Blockchain and digitalisation
BLOCKCHAIN AND THE FUTURE OF DAM
Examining a Windows NT Infrastructure (2)
Bitcoin: A New Internet Currency
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Campbell R. Harvey Duke University and NBER
Microsoft Office Access 2003
Distributed Ledger Technology (DLT) and Blockchain
Blockchain Alexander Prenta 9/27/2018.
Git CS Fall 2018.
Outline Using cryptography in networks IPSec SSL and TLS.
Consensus Algorithms.
GRIF DEX is an international decentralized exchange, a trading platform where you can buy and sell coins, tokens and fiat currency. An exchange will conform.
RUBIDEX Blockchain Overview RUBIDEX.NET-A reliable Blockchain Solution.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Blockchain Technology: A New Approach to Provenance
INTEGRATED PAYMENT PROCESSING 101
Protect data in core business applications
Not about digital currencies
Presentation transcript:

Benefit 1: Improved Security With any system involving payment and customer data, one of the biggest, if not the biggest, concern is security. With the increasing intelligence of hackers, the need for a secure system is imperative to a company’s success and the customer’s protection.

Improved Security Current solutions are not advanced enough 60% of travel merchants felt fraud was a top issue when paying suppliers Cost impact for OTA to Supplier is 6B in direct costs Only 20-30% of transactions were being checked to catch fraud However, after talking to a Sabre Virtual Payments senior manager and reading an interview by the VP of eNett International, we found that current solutions for security are not advanced enough, as ”fraudsters” are expected to easily break through this. 60% of 60% of travel merchants felt fraud was a top issue when paying suppliers, with the cost impact for OTA to Supplier being 6B in direct costs. Lastly, only 20-30% of transactions were being checked to catch fraud. So the question becomes, how can we alleviate these problems? We believe blockchain is the answer. - VP of eNett International https://www.enett.com/insights/airline-failures-form

Blockchain Security Advantages Instant Timestamps Encryption Confirmation Blockchain can be a bit overwhelming for many people, and some of you might not have a clue what the heck it is. So briefly, I will explain the basic concept of it and reasons why it is so secure. This is the mac file manager, which is just like the file manager on a Windows machine. It is where all your files are stored. So, I send Esteban (team member) 10 dollars. The transaction file is created and stored. I then send Natalie (team member) 10 dollars. The transaction file is created and stored. I send Luis (team member)10 dollars, the transaction file is created and stored. Now, each of these transactions are timestamped, providing information of who, what, when, where, and how the transaction occurred. Each transaction is encrypted with AES encryption, which to date has not been able to be breached, and each transaction is instant and confirmed.

Blockchain Security Advantages Now for this example, let’s say that only 3 transactions can be held by a folder. Well, then a folder would be created. Now each created folder has a unique connector that is created with it. I conduct three more transactions, and another folder would be created. This folder not only creates a unique connector, but also contains the connector of the previous folder, which makes them match. I conduct more transactions and more folders are created. As you can see, each folder matches and connects with the previous one. However, let’s say that Esteban tries to alter a transaction between he and I, and tries to make my account send 50 dollars instead of 10.

Blockchain Security Advantages Chain is now broken and shorter Break shows someone has tried to tamper file The connector of the folder holding that transaction would change and create a different unique shape. Why is this? Well, each time information is altered in the folder, a unique connector is regenerated. But if this occurs, then the chain would break, as the next folder no longer contains the previous folder’s connector. The chain now is broken and shorter and thus shows that someone tried to tamper with the file.

Blockchain Security Advantages Constant synchronization One open ledger for all parties Can set permissions As well as the chain structure, the blockchain also is decentralized, meaning you don’t have to rely on one server and/or one party controlling all of the information. With blockchain, thousands and thousands of computers are powering the blockchain. This means that a hacker would have to hack all the computers at the same time instead of just one single server. Each of these computers are being constantly synced up. Another advantage with this is that there is one ledger for all the parties involved. Esteban and I are using one ledger to record the transactions instead of he using his own ledger and I using my own ledger, and these ledgers can be set to have permissions on who exactly can see everything.

Improved Security -Immutable -Decentralized -Encrypted -Verification -Instant To summarize, blockchain provides, among many others, five key advantages for security: immutability, decentralization, encryption, verification, and instantaneous payment settlement.

Appendix Restructure: Team Intro problem statement, HAVE NUMBERS --------------GETTHERE SOLUTION----SABREPAY-----BENEFITS blockchain 101 blockchain benefits (security, fraud) B2B payment currect state vs. future finance implementation ONLY 3 PHASES NOW

Benefit 2 (In Depth): Improved Security

Digital Signatures

Linked Blocks Each block is linked to one another, so if someone attempted to alter one, all of the blocks would be altered, which is impossible.

Timestamps Tell you how, when, what, who, etc. about a transaction There are rules and constraints with timestamps in blockchain “Transactions must be in order or less than a 5 hour difference” Comparable to file information

Synchronization Constant synchronization on every server/machine partaking in ledger

Decentralized “no central point of control” “utilizes innovative consensus protocols across a network of nodes to validate transactions and record data in a manner that is incorruptible.” Centralized Decentralized https://lisk.io/academy/blockchain-basics/benefits-of-blockchain/what-is-decentralization

Decentralized Blockchains and ledgers can be permissioned to only allow certain people to access it Still unable to add to the chain without consensus and cannot tamper with records due to encryption Ripple, for example, only allows validated people to access the ledger, including but not limited to Microsoft, Massachusetts Institute of Technology, and WorldLink.

Automation From a governance perspective, as ledgers actively match (and check) with distributed ledgers, the finished chain becomes a (balanced) shared perspective of all agreements between parties or in a network. “The idea of a distributed database where *trust* (*authenticity of information*) is established through mass collaboration and clever code rather than through a powerful institution that does the authentication and the settlement…is the biggest innovation in computer science”. -Don Tapscott, Tapscott Group CEO All happens automatically

With a centralized system, it is much easier to overload a network Fees The main way we deal with a DoS (making network unavailable to users by flooding network) attack of legitimate-looking transactions is by raising transaction fees. If 51% of the network requires a specific transaction fee, you won't get a consensus if you don't pay it. These fees scale drastically as the network load increases The harder they attack, the more they must pay DoS attacks seek to consume resources and attack the network With a centralized system, it is much easier to overload a network