Advance cyber attacks & generations old cyber defence strategies

Syed Bari
3 min readMay 19, 2021

--

Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for public safety, national security, agencies and firms.

Cyber attacks on critical infrastructures are growing at the record breaking speed, just in last few weeks, there were few major cyber attack happened which caused not only thread to public safety but also a panic which caused financial impact to the economy as well.

Advance Cyber Attack Tools

Machine Learning, Artificial Intelligence, high computing power and many other technological advancement in the wrong hands can be combined and used against the humanity, and this is what causing advanced cyber attacks on critical infrastructure to post threads to public safety and national security.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
When hackers need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more.

VPN — Virtual Private Network

VPN is a middleware driven architecture, where centralized authentication happen, and considering technological advancement this approach encourage huge amount of vulnerabilities which is difficult to monitor and counter by any organizations.

BIoT — Blockchain IoT Protocol

BDATA’s BIoT protocol is a very light weight and advance technology which can be deployed on any device to provide embedded cyber defence by providing distributed authentication .

BIoT is a multi chain architecture, which provide comprehensive end to end encrypted secure data streaming.

It has a series of TLS certificate which are generated at random timing to provide cryptographic distributed device authentication from endorsing peers.

BIoT is a decentralized protocol, which can protect, detect and contain the advance cyber attacks

How BIoT works?

BIoT is a easy to deploy on critical infrastructures, its a 3 step process, enroll the organization, enroll device, run curl command on the device.

Device will be authenticated based on the device log, device board identity as well as other key features.

Conclusion

BIoT is an innovative technology which is easy to deploy and provide strong protection with a complete understanding of all the vulnerabilities and cyber attack attempts to the network.

--

--

Syed Bari

Syed is the founder of BDATA Solutions Inc, a canadian startup provide blockchain connectivity of IoT devices to ensure secure connectivity and immutable data.