CFP last date
20 May 2024
Reseach Article

Cybersecurity Risks of Blockchain Technology

by Ihab M. Abdelwahed, Nagy Ramadan, Hesham Ahmed Hefny
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 42
Year of Publication: 2020
Authors: Ihab M. Abdelwahed, Nagy Ramadan, Hesham Ahmed Hefny
10.5120/ijca2020919922

Ihab M. Abdelwahed, Nagy Ramadan, Hesham Ahmed Hefny . Cybersecurity Risks of Blockchain Technology. International Journal of Computer Applications. 177, 42 ( Mar 2020), 8-14. DOI=10.5120/ijca2020919922

@article{ 10.5120/ijca2020919922,
author = { Ihab M. Abdelwahed, Nagy Ramadan, Hesham Ahmed Hefny },
title = { Cybersecurity Risks of Blockchain Technology },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2020 },
volume = { 177 },
number = { 42 },
month = { Mar },
year = { 2020 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number42/31183-2020919922/ },
doi = { 10.5120/ijca2020919922 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:48:25.385257+05:30
%A Ihab M. Abdelwahed
%A Nagy Ramadan
%A Hesham Ahmed Hefny
%T Cybersecurity Risks of Blockchain Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 42
%P 8-14
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Blockchain technology has become a paradigm shift to digital transactions. It has brought massive potentials in many fields, such as financial services, energy, healthcare and Internet of Things. As often occurs with innovative technologies, it has suffered from several critical Cybersecurity threats and vulnerabilities. The complicated relation between Cybersecurity risk management and companies strategic and operational objectives which make identifying, analyzing, and controlling the relevant risk events as a major challenge. In this paper, the researchers classify those incidents against the Cybersecurity vulnerabilities in Blockchain technology and explain the methods of risk measures according to the Information Security Risk Assessment (ISRA) Models.

References
  1. Turstwave Resource Library 2017,”Information Security Risk Assessment -Industry Best Practices to Keep Your DataSecure”,retrievedfromhttps://www.trustwave.com/enus/resources/library/documents/evaluating-your-it-risk-assessment-process-does-it-stand-up-to-current-best-practices/.
  2. Legal News & Analysis, Asia Pacific Banking & Finance 2018.Break Through with Blockchain – “How Can Financial Institutions Leverage a Powerful Technology?” Retrieved from https://conventuslaw.com/report/break-through-with-blockchain-how-can-financial/
  3. Giacomo, M, Enrico S, Andrea B, 2018. Risk Assessment of Blockchain Technology .In 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), 87 - 96.
  4. Information technology, security techniques, information security risk management, ISO/IEC 27005:2011.
  5. Alkhalifah, A. Ng, A Kayes, J Chowdhury, M Alazab 2019,” A Taxonomy of Blockchain Threats and Vulnerabilities “retrieve from www.preprints.org.
  6. Deloitte 2018 .Risks posed by blockchain-based business models is your organization prepared? ”Retrieve from https://www2.deloitte.com/us/en/pages/risk/articles/blockchain-security-risks.html.
  7. Merlinda A., Valentin R., David F., Simone A., Dale G., David J., Peter M.& Andrew 2019. Blockchain technology in the energy sector: A systematic review of challenges Renewable and Sustainable Energy Reviews, and opportunities – Elsevier, 100, 143–174.
  8. Claudio, L. 2018, ‘Developing Open and Interoperable DLT/Blockchain Standards”, Blockchain Engineering Council; IEEE Blockchain Standards Working Group, 106 - 111.
  9. Stroie E. R. 2011,”Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches “, Chinese Business Review, Vol. 10, No. 12, 1106-1110.
  10. Alexander A. G.,Phuoc Q., Mahesh P., Zachary A. C.,Jeffrey M. K., Dayton M., & Igor L. 2017 ‘Multicriteria Decision Framework for Cyber security Risk Assessment and Management “,Wiley Online Library , DOI: 10.1111/risa.12891 .
  11. Linkov I, Satterstrom FK, Kiker G, Seager TP, Bridges T, Gardner KH, Rogers SH, Belluck DA & Meyer A. 2006.”Multicriteria Decision Analysis: A Comprehensive Decision Approach for Management of Contaminated Sediments”, Cambridge Environmental Inc. 26(1):61-78.
  12. Linkov I, Satterstrom FK, Kiker G, Bridges T, Ferguson E. 2006”From comparative risk assessment to multi-criteria decision analysis and adaptive management: Recent developments and applications”, environment International ,Elsevier ,Vol 32, Issue 8,  1072-1093.
  13. M Pendleton, R Garcia-Lebron, JH Cho, 2016“A Survey on Systems Security Metrics “ACM Computing Surveys 49(4):1-35.
  14. AA Ganin, P Quach, M Panwar, ZA Collier 2017, “Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management”, Wiley Online Library.
  15. Hamido Fujita Angelo Gaeta ,Vincenzo Loia ,Francesco Orciuoli,  ‎2019 ” Improving awareness in early stages of security analysis: A zone partition method based on GrC “Applied intelligence volume 49, pages1063–1077.
  16. Z Amin, 2019 “A practical road map for assessing cyber risk” Journal of Risk Research, Taylor & Francis.
  17. Thomas Llansó , Martha McNeil,Cherie Noteboom, 2019” Multi-Criteria Selection of Capability-Based Cybersecurity Solutions” the 52ndHawaii International Conference on System Sciences
  18. Marco Rocchetto ,Nils Ole Tippenhaue,20116 “On Attacker Models and Profiles for Cyber-Physical Systems” ,Conference: European Symposium on Research in Computer Security
  19. Ángel J. Varela-Vaca, Luisa Parody, Rafael M. Gasca1, María T. Gómez-López1, 2019” Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Model” IEEE Access PP (99):1-1 .
  20. Justin Fanelli​​1, John Waxler ,2019” Prioritizing computer security controls for home users” Retrieve from https://peerj.com/preprints/27540/# .
  21. Tanweer Alam, 2019” Blockchain and its Role in the Internet of Things (IoT)”. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 5 | Issue 1.
  22. Hong fang Lu, Kun Huang, Lijun Guo, 2019,” Blockchain Technology in the Oil and Gas Industry: A Review of Applications, Opportunities, Challenges, and Risks”, IEEE Access.
  23. Giacomo Morganti, Enrico Schiavone; Andrea Bondavalli, 2018,”Risk Assessment of Blockchain Technology” LADC 2018, 8th Latin-American.
  24. KPMG International, 2017. Securing the chain, retrieve fromttps://home.kpmg.com/xx/ena/home/insights/2017/05/ securing-the-blockchain-fs.html.
  25. Huru H., Ui‐jun B., Mu‐gon S., Kyunghee C., Myung‐Sup K. 2019. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. The International Journal of Network Management, Vol29, Issue2.1-36. Information Risk Approaches. Chinese Business Review, Vol. 10, No. 12, 1106-1110.
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Risk Assessment Blockchain Threat Vulnerabilities