Verified Document

BlockChain Cyber Crime And Cyber Security Term Paper

Cyber Security BlockChain

Cybercrime is one of the most leading types of crime these days as the use of the internet is inevitable, and so has cybersecurity gained a new significance. Cybercrime can cost the economy up to $500 billion every year (Daley, 2019). The current security system seems to be obsolete as new updates in the technology give rise to new types of methods through system breach can easily be conducted by the cybercrime offenders.

The selected technology for protecting cyber systems is BlockChain, which has proved reliable and beneficial. It has a decentralized system in which the information is available in transparency to any user of the Black Chain (Daley, 2019). The software allows its users to record, transfer and see any transaction-based data encoded onto their BlockChain. This process creates trust as it provides the users with data integrity and confidence that they can easily use it without any threat of a breach.

The significance of decentralized is mandatory to realize in BlockChain technologys scenario since it is known as the e-cost of trust (Linke, 2018). The centralized ledgers have the kind of data that cannot be controlled by human hands and minds and thus is trusted more; however, it is time-consuming and expensive to maintain. For this reason, multiple systems are attached for maintaining the connected ledger, and the cost of heavy trust is existent.

Block Chains applications could be seen in supply chain management and management of digital currencies. In supply chains, there is a series of processes and various participants included to enhance the value chain for the businesses. The establishment of common records gives the user the openness of access to the transactions, which is the foundation of its trust. It has an impactful efficiency since each supply chain member can keep track of the information with an equal dose of knowledge for everyone. In terms of currency management, the accounting records for the online financial trade are backed by BlockChain since the distributed trade for all people, no less for anyone, and no more for anyone is the sole strategy of this technology. Making better decisions for the public utility is carried out by BlockChain so that this technology fulfills the intermediation responsibilities.

Thesis

The proposed thesis for this paper is:

BlockChain has endless benefits and opportunities in todays world of the internet;...

…use crypto-currency, and banks are on constant vigilance for paying close attention to the crypto-currency trend.

The third recommendation for dealing with the ethical dilemma of information sharing in the handling of medical health records and gaining informed consent for getting specific treatment, BlockChain can help open the exchange of relevant information between the concerned parties (Mann et al., 2021). The expertise of this technology can support in creating motivation for the stakeholders of this process for gaining insight and knowledge of the current system.

Conclusion

Blockchain technology benefits decentralized applications in various fields in the modern business world, especially in the energy sector, crypto-currency, supply chain management, etc. Still, there are some concerns regarding the ethics of its usage and lawful prohibitions to protect the users and the consumer data that is open for sharing and exposure, increasing the risk of a data breach. With the suggestions of access control by IoT experts, a constant vigilance of banks for managing crypto-currency with BlockChain, and informed consent for managing electronic health data, it is necessary that methodological tasks of its application and conditions of transparency should be explored in the future for its long-term success and fruitful investments for valuable…

Sources used in this document:

References


Daley, S. (2021, May 28). Wallets, hospitals, and the Chinese military: 19 examples of BlockChain cybersecurity at work. Built-in Beta. https://builtin.com/blockchain/blockchain-cybersecurity-uses


Ishmaev, G. (2020). The ethical dilemmas of Blockchain-enabled markets for private IoT data. Philosophy and Technology, 33, 411-432. https://doi.org/10.1007/s13347-019-00361-y


Linke, R. (2018, February 12). Block Chain’s applications reach further than you think. MIT Sloan. https://mitsloan.mit.edu/ideas-made-to-matter/blockchains-applications-reach-further-you-think


Mann, S.P., Savulescu, J., Ravaud, P. & Benchoufi, M. (2021). Blockchain, consent, and present for medical research. Journal of Medical Ethics, 47(4). http://dx.doi.org/10.1136/medethics-2019-105963


Schmid, M. & Mann, S.P. (2019). Two sides of a coin: Blockchain, ethics, and human rights. InfoQ. https://www.infoq.com/articles/blockchain-ethics-human-rights/


Tang, Y., Xiong, J., Arreola, R.B. & Iyer, L. (2019). Blockchain ethics research: A conceptual model [Paper presentation]. SIGMIS-CPR ’19, June 20–22, 2019, Nashville, TN, USA. https://www.researchgate.net/publication/333765314_Blockchain_Ethics_Research_A_Conceptual_Model

Cite this Document:
Copy Bibliography Citation

Related Documents

Blockchain
Words: 4240 Length: 13 Document Type: Term Paper

Introduction One of the most talked-about emerging technologies is the blockchain. Originally developed for Bitcoin, blockchain shows a tremendous amount of promise in terms of reducing certain types of friction, especially in business (Marr, 2018). Over the past couple of years, blockchain has been unpacked from cryptocurrency and a wealth of applications using the technology are in development. Many observers predict that blockchain technology will revolutionize a wide range of businesses

Blockchain-based Property Ownership Recording System
Words: 640 Length: 2 Document Type: Essay

Buying land in Palestine, especially outside the cities, is problematic. In the cities, it is very expensive. Outside the cities, there are few title deeds or evidence of legal ownership, which is a factor that can be utilized by Israeli settlers seizing property on the West Bank. While Palestinians may like to own property, the cities have priced them out, and the outer regions are risky. To address the risk,

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now