B(lock)chain

Lock the (block)chain Workshop

25 April 2018

Full Day Event

Blockchain technology is decentralized system for exchanging crypto (digital) coins or some services between two sides (peoples and/or machines). On the other hand, the transactions between two sides are recorded in a public ledger. All people can see, but do they know to read.

Like all IT systems, blockchain and services based on it have security problems, too. We will analyse hackers activates on blockchain and cryptocurrencies like crypto coins theft, accounts stealing, phishing attacks, fake cryptocurrencies, pump & dump schemes, etc. Whole system (decentralized system, blockchain, transaction integrity, cryptocurrencies, digital wallet, digital addresses, etc.) would not exist without strong security protection and strong crypto algorithms. Most people are not familiar with cryptography implemented in blockchain. This opens space for many fraudulent acts, and especially for social engineering. Special attention will be paid to (possible) security problems in some existing blockchain solutions and cryptocurrencies (Bitcoin, IOTA, etc.). Some of the interesting questions will be answered are: how the chain is formed; what is ICO; are transactions anonymous or not; can the police catch criminals who use cryptocurrencies…

Some of the interesting questions will be answered are: how the chain is formed; what is ICO; are transactions anonymous or not; can the police catch criminals who use cryptocurrencies…

Content

  • Introduction to blockchain
    1. What is blockchain and how it works?
    2. What are cryptocurrencies?
    3. What is ICO?
    4. Pros & cons of new technology
  • Blockchain security
    1. CIA triad of data in blockchain
    2. Problems with decentralized system
    3. Security of digital wallets and uniqueness of digital addresses
    4. Types of blockchain cyber attacks
    5. Crypto coins theft, accounts stealing, social engineering
    6. Real and fake cryptocurrencies
    7. Pump & dump schemes
    8. Overview of applied crypto algorithm
    9. How the chain is formed
    10. Do you need to change existing crypto algorithms or develop new (IOTA)
    11. Anonymity of transactions
    12. Money laundering
    13. Can the police catch criminals who use cryptocurrencies
  • Implementation of blockchain and security risks
    1. Companies, blockchain and cryptocurrencies
    2. Which security risks companies need to analyse before implementation
    3. Security risks that have arisen and potential risks
    4. Good and wrong implementation of crypto algorithms and other security problems
    5. Real-life implementations and those that are in the development phase



    Training is designed for everyone who wants to become acquainted with blockchain technology and understand or learn more about security aspects of blockchain and cryptocurrencies.


    Prerequisits for attending the training:

    • Elementary level – information technology. (Advanced is plus.)
    • Laptop (basic configuration).

    • SIGN UP!