InfoTech Democracy, Blockchain and Cybersecurity

in blockchain •  8 years ago  (edited)

IT industry is a phenomenon of metamorphic nature; all should unlearn what was learnt and relearn to keep up with the evolutionary changes, information liberation, multi-faced cybercrimes exploitation and IoT proliferation. The changes in IT and its security is unprecedented thus sharpen the razors of blades as you evolve with persistent cyber technology revolution!

Guarantee of compensation from damage, fail, loss or deceased in return of imbursement of a premium knowledge investment is an IT insurance. IT or data loss prevention (DLP) insurance is primarily for data intelligence, productions and protections. Technology is the vertebra of data science and pool of ever-exploding wisdom to be insured to protect from data injuries, bullying, loss and accidents.

What is InfoTech-Democracy?

Internet is an ample proof of centralized system being victim of DDoS attacks, traffic congestion and delay in communications. The socialist Internet should re-architected and evolved with distributed democratic blockchain technology. Evolution of blockchain will certainly decouple contemporary architecture, distribute the computer resources and decentralize the organizational structures. Blockchain is going to be a firm fundamental pillar of democratic IT eco-society, as it empowers distributed blockchain nodes by liberating resources from totalitarian concepts of centrally managed networks and systems.

Reluctantly, laws, rules and regulations should embrace socialist methodology but its influence should be applicable at minimal as “not to practice full control on freedom of information sharing (protect WiKiLeaks.org), privacy protection and preserve cyber practice and passion; however in case of global terrorism, laws and regulations should overrule by the legal authorities or government by preserving the democratic IT values for the cyber sustainability”.

In regards to blockchain technology, it requires regulations and bylaws to manage cyber frameworks, policies, standards and guidelines. And also procedural control and monitoring should be in place to protect cyber consumers from cyber-pets, cyber-insects, cyber-criminals, cyber-bacteria and cyber-viruses. Perhaps communism shares the resilient values on controlling and monitoring. On the other hand, cybersecurity should emphasis on reducing risks to its acceptance level but should not interpret as utilitarian, “greatest good for the greatest number”.

Thus blockchain technology transformation transitioning from centralization to distribution of the applications, systems and services, and demolition and decentralization of pyramid organizational structure is an imminent. Blockchain backed technologies are advancing to the major disruption that no one would have ever imagined, such as FinTech and BioTech revolution. Regulation on blockchain proliferation evolving with private, consortium and public concepts is a must to understand, socialize, and share to practice and experience the IT democracy.

Blockchain Impulse InfoTech Decentralization & Distribution

Blockchain is a distributed ledger technology backed by transactional encrypted databases where data transactions are sync up in real-time across each nodes. Verification of each transactions performed at nearest nodes followed by synchronous updates across global cloud or premise based hosted nodes.

For an instance, insurance companies have global presence but most of the IT systems are centralized to data centers on premise, on the cloud or hybrid in nature. Centralized resources serve the organizational purpose based on headquarter, branches, sales centers, production sites or warehouses requirements. Nevertheless traditional applications are built with client-server based architecture and communicated via centralized systems and networks infrastructures. This led to the delay, jitter and intermittence with high costs to WAN circuits and traffic jam over the public and MPLS private internet owned by ISP giants.

Blockchain enables distribution of the core databases along with tiers of web and application servers across the global nodes. Those nodes sync up among all nodes with live transactions updates. Since all the tiers are embedded on the scattered nodes, from ecommerce services prospective, core blockchain is a link-state database chain or Tier-3 (database layer); application servers run on the top of core distribution database as Tier-2 (application layer) that are programmed blockchain nodes; and programmable web interfaces that can be provisioned anywhere to support distributed infrastructures as Tier-1 (web interface layer).

For an instance a beauty products provider can provision its web portal at global cloud provider such as AWS or AZURE and DNS servers hosted at AKAMAI cloud. Any IoT client can access the web portal from any part of the world but information will be facilitated from the nearest blockchain nodes at each regions facilitated by these cloud service providers (CSP). This enables efficient, effective and secure communication and data delivery.

Distributed purchasing and payment systems over blockchain systems allows wire transactions fast and efficient. For an instance a customer from South America visits a company’s marketing portal, the customer selects the products and place an order that redirects to ecommerce-site, the ecommerce webserver redirects order to application servers and the application servers access the databases. Upon the specific order gets completed a payment server presents the payment interface where the customer and credit card data are entered.

In every unseen processes where web-servers, app servers, database servers and payment servers provide services that are hosted on blockchain instances servers at each distributed nodes, and region specific customer gets served regionally to the local services. Meanwhile each node across the distributed systems, data are updated in real-time as all the servers at all nodes are synchronized accordingly in highly secure environment.

In the same manner the credit card data are validated and verified directly to the specific bank’s blockchain servers at nearby nodes. Upon credit card data are verified and amount is deducted that goes to seller’s account and the transaction gets completed.

After all, the seller supply-chain database gets alerted for shipment. Each products are barcoded with hashed value that are readable by scanner or other programmed interfaces but can be verified at any distributed blockchain nodes. Once product dispatched it will be tracked and monitored its delivery status all along the way to the customer’s door. The customer expects exact same product with exact hashed value so a greater integrity is maintained end to end.

Overall blockchain technology adoption will force to decentralize the existing pyramid organizational structure to distribute wealth of resources across the distributed blockchain nodes also called a distributed ledger technology (DLT).

Blockchain Smart Contracts Law & Regulations for Cybersecurity

Law & Regulations are fundamental parts of human society and it applies to communication and technologies. Blockchain enables to embed law, regulations, auditing and compliance within a smart contracts. For an instance, 1MB blockchain size is a potential for a DDoS attack due to high volume of transactions at a time. The transactions might be considered invalid, fraudulent and dispute and are biased humanly.

Thus further development takes place in collaboration of global jurisdictions, standards, compliances and frameworks to develop a common security plan and legal policy and embed into smart contracts. Although AI (Artificial Intelligence) or embedded smart contracts automated or self-executable can only be used as proof for verification purpose. Perhaps a judge or jury could use these hashed digital prints or the smart contracts for forensic investigation purpose.

As FIPS (Federal Information Processing Standards) compliance standard 140-2 (FIPS 140-2) describes that US federal government requirements the IT products and services should meet for sensitive, but unclassified (SBU) use as the standard was published by NIST (National Institute of Standards and Technology) has been adopted by Canadian government’s Community Security Establishment (CSE), and is likely to be adopted by the financial community through the American National Standards Institute (ANSI).

The FIPS & NIST standard’s security requirements must be satisfied by a cryptographic module used in security system protecting applications, systems and infrastructures. It also covers to have strong encryption to be used throughout the application or software development and implementation. This is accomplished by blockchain technology more than what was described by both FIPS and NIST.

SOX (Sarbanes-Oxley) act represents comprehensive auditing for finance related reporting of working papers, logs and events and correspondence to all financial communications exchanges and related trades and deals statements of the public company. A part of accounting is also viewed by SOX compliance. Blockchain embed these concerns within a smart contract will incorporate accountants and compliance agents mandatories.

GLBA (Graham-Leach Bliley Act) represents multi-tier cyber security will be enriched by blockchain technology by decentralizing services to the edge. Such as at endpoint or access level hardening Operating Systems, infrastructure devices access and privileges controls, secure infrastructure architectures design, firewalls, VPNs, proxies, events, flows and logs management covering full client-side security in bid to protect information that is collected from various clients such as SSN, credit card details and transaction histories.

Basel I, II & III is more about finance and consumers’ assets and capital management with strong cyber security protection availability that relates to technology and infrastructures. However blockchain has not covered yet by Basel series. Basel also talks about risk mitigation, litigation, collateral where blockchain is going to crumble the pyramid style organizational structure. Nevertheless Basel further describes the businesses should be conducive with strong security protocols as it enhanced by blockchain means extensive security features and flexibility to facilitate financial business.

Nevertheless blockchain technology adoption contributes reduction on cybercrime, saving cost on cyber warfare and keeping bad guys off the data infrastructures properties, systems, applications and related technologies. Perhaps regulatory and governments should review and redefine law and legal, frameworks, compliance and standardization aspects of blockchain to the outdated encryption and technologies contemporarily covered by FIPS, FISMA, NIST, SOX, GLBA and Basel accordingly.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

How can you have a decentralized system and a socialistic Internet? I'm confused.

Congratulations @bippo! You have received a personal award!

Happy Birthday - 1 Year on Steemit Happy Birthday - 1 Year on Steemit
Click on the badge to view your own Board of Honor on SteemitBoard.

By upvoting this notification, you can help all Steemit users. Learn how here!

Congratulations @bippo! You have received a personal award!

2 Years on Steemit
Click on the badge to view your Board of Honor.

Do not miss the last post from @steemitboard:

Trick or Treat - Publish your scariest halloween story and win a new badge
SteemitBoard notifications improved

Support SteemitBoard's project! Vote for its witness and get one more award!

Congratulations @bippo! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 3 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!