Discuss The Blockchain Security Techniques

Blockchain Security Techniques:

Instructions Part 1: Blockchain Concepts You must have Corda Demobench installed to perform this part of the Assessment. If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: Corda Demobench Setup. Complete the following: For each of the following actions, use the Corda Demobench to formulate a solution. Please copy the numbered action into your Microsoft Word document. Please respond to items 1–4 below. For item 5, provide screenshot of the execution of the tutorial showing the actions and the result set. Start a next action on a new page. Select two consensus mechanisms used in blockchains today. Critique the uses, advantages, and disadvantages you find in your research. Include which blockchains use the chosen consensus algorithms. Assess how distributed applications compare to typical web applications. Include how each may work and a typical environment for each. Explain how blocks are constructed and what makes up a block. Determine how a double spend can be prevented in blockchain technologies. Complete the tutorial to show the operation of creating transactions in the Demobench environment. Briefly assess what each node, and notary, did. Include a screenshot of the final Node Explorer cash screen. Save the setup to keep the nodes and notary created in the tutorial. In order to obtain mastery level for this Competency Assessment, complete the following: Explain the Corda architecture setup of components, such as nodes, oracles, notary, etc. YouTube. Retrieved from https://www.youtube.com/ Part 2: Blockchain and Securing Data You must have R3 Corda Demobench for the Assessment. This was installed earlier in the previous part of the Assessment. You will also use the H2 Database Engine for data security concepts. You can use the following document to assist you with the installation of the H2 Database software. Complete the following: For each of the following actions, use the Corda Demobench or H2 database to show the solution. Please copy the numbered action into your Microsoft Word document. For items 1–5 below, provide screenshot of the execution of Corda and H2, showing the actions and the result set. Start a next action on a new page. Start the demobench. Perform the flowing actions. Create a validating notary. Create a Bank of Breakfast Tea node as an issuer of GBP. Create a Bank of Big Apple as an issuer of USD. Create an Alice node. Not an issuer. Any country is fine. Create a Bob node. Not an issuer. Any country is fine. Perform the following transactions: Have the Bank of Breakfast Tea issue 2,000,000 GBP to the Bank of Big Apple. Have the Bank of Big Apple issue 2,000,000 USD to the Bank of Breakfast Tea. Have the Bank of Breakfast Tea pay Bob 1,000,000 USD using the Bank of Big Apple as the Issuer. Have the Bank of Big Apple pay Alice 1,000,000 GBP using the Bank of Breakfast Tea as the Issuer. Have Alice pay Bob 500,000 GBP to Bob. NOTE: Keep the demobench running until told otherwise. Using a shell, go to the demobench directory for the actions above. For instance, mine are at: $HOME/demobench//. Perform the following actions: Change to the notary folder and determine the following: How is the notary identified? HINT: starts with nodeInfo. Go to the certificates folder. Using the keytool, determine the alias name for each keystore in the directory (usually three .jks files) SSLShopper. Retrieved from https://www.sslshopper.com/ Using a shell, evaluate the node.conf settings. Determine which settings you would change to better secure RPC connections to the notary. Explain your answer. Download and install the H2 database engine. Once installed, start the H2 console. Please note, this is outside the Corda environment. Perform the following actions: Using demobench, familiarize yourself with the node database for the user Bob. Determine, and show, the JDBC database connection string. Close the h2 console that you got this from. Using that JDBC connection string, attach to that database in the H2 console outside the corda environment. Determine the location of the persistence.mv.db file for Bob. Show the directory listing for that. Go back to the H2 console, outside the corda environment, stop demobench, and connect directly to the persistence database file for Bob. Evaluate and determine possible data access vulnerabilities. H2Database. Retrieved from https://www.h2database.com/html/main.html

Get Your Custom Essay Written From Scratch
Are You Overwhelmed With Writing Assignments?
Give yourself a break and turn to our top writers. They’ll follow all the requirements to compose a premium-quality piece for you.
Order Now