Blockchain integration and zero trust model for data security in corporate networks

Authors

  • Vinicius Gadelha dos Santos FATEC Zona Leste
  • Walison Martins Vitorio FATEC Zona Leste

DOI:

https://doi.org/10.5281/zenodo.13324038

Keywords:

Corporate Networks, Blockchain, Zero Trust, Data Security

Abstract

Data security and integrity are becoming increasingly important in the corporate world. With the rise of blockchain, companies are adopting the technology for its security features such as data encryption, immutability and integrity of information, and its decentralized network. There are many different network security strategies and models, but the combination of the zero trust model with blockchain networks is likely to prove efficient and effective for those who want more security for their data. This article was made to review and analyze the contents currently available through a qualitative approach, to which the bibliographic research procedure is applied for validation of the theme. The purpose of this article is to disseminate the knowledge of new security technologies to reduce the risk of attacks on corporate networks. Based on concepts such as not trusting any user or device, the zero trust model adds a security layer that, when integrated with blockchain networks, can be an effective solution to improve the security and transparency of corporate networks.

Downloads

Download data is not yet available.

References

O que é uma VPN?. CLOUDFLARE, 2023. Disponível em: https://www.cloudflare.com/pt-br/learning/access-management/what-is-a-vpn/. Acesso em: 16 novembro 2023.

Segurança de rede Castelo e Fosso. CLOUDFLARE, 2023. Disponível em: https://www.cloudflare.com/pt-br/learning/access-management/castle-and-moat-network-security/. Acesso em: 16 novembro 2023.

O que é uma rede Zero Trust? CLOUDFLARE, 2023. Disponivel em: https://www.cloudflare.com/pt-br/learning/security/glossary/what-is-zero-trust/. Acesso em: 15 novembro 2023.

THALES, 2022 Thales Data Threat Report: Navigating Data Security in an Era of Hybrid Work, Ransomware and Accelerated Cloud Transformation, Global Edition, 2022. Disponível em: https://cpl.thalesgroup.com/sites/default/files/content/research_reports_white_papers/field_document/2022-03/2022-data-threat-report-global-edition.pdf. Acesso em: 16 novembro 2023.

THALES, 2022 Thales Data Threat Report: Navigating Data Security in an Era of Hybrid Work, Ransomware and Accelerated Cloud Transformation, Emea Edition, 2022. Disponível em: https://www.exclusive-networks.com/se/wp-content/uploads/sites/25/2022/06/2022-thales-data-threat-report-emea-edition.pdf. Acesso em: 16 novembro 2023.

APPS, Spinning Cloud. Zero Trust Security: Everything You Need to Know. Security Boulevard, 2022.

Disponível em: https://securityboulevard.com/2022/11/zero-trust-security-everything-you-need-to-know/. Acesso em: 15 novembro 2023.

KIME, Chad. Whitelisting vs Blacklisting: How Are They Different? eSecurity Planet, 2023. Disponível em: https://www.esecurityplanet.com/applications/whitelisting-vs-blacklisting-which-is-better/. Acesso em: 15 novembro 2023.

GOSS, Michaela. VPN vs. zero trust vs. SDP: What's the difference? TechTarget. 2022. Disponível em:https://www.techtarget.com/searchnetworking/feature/SDP-vs-VPN-vs-zero-trust-networks-Whats-the-difference. Acesso em: 15 novembro 2023.

INFRA. Tendências de segurança cibernética para 2023. 4INFRA, 2023. Disponível em: https://4infra.com.br/tendencias-de-seguranca-cibernetica/#:~:text=Conhe%C3%A7a%20as%20tend%C3%AAncias%20de%20seguran%C3%A7a,padr%C3%A3o%20Zero%20Trust%20e%20computa%C3%A7%C3%A3o. Acesso em: 18 novembro 2023.

BINOJ, SS. Enhancing Cybersecurity with Zero Trust and Blockchain Technology. LinkedIn, 2023. Disponível em: https://www.linkedin.com/pulse/enhancing-cybersecurity-zero-trust-blockchain-technology-s-s/. Acesso em: 18 novembro 2023.

OKABAYASHI, Mitie. Segurança de dados e Blockchain: entenda as relações. Rípio, 2022. Disponível em: https://launchpad-br.ripio.com/blog/seguranca-de-dados-e-blockchain-entenda-as-relacoes. Acesso em: 18 novembro 2023.

COELHO, Beatriz. Os diferentes tipos de pesquisa científica. Qual se aplica melhor a você? Mettzer, 2019. Disponível em: https://blog.mettzer.com/tipos-de-pesquisa/. Acesso em: 16 novembro 2023.

Guia de infraestrutura e proteção de rede. UPX, 2021. Disponível em: https://upx.com/post/infraestrutura-protecao-de-rede/. Acesso em: 15 novembro 2023.

MULLINS, Heath. Embrace proactive security with Zero Trust. Microsoft, 2023. Disponível em: https://www.microsoft.com/en-us/security/business/zero-trust. Acesso em: 17 novembro 2023.

DIAS, Gabriel. Record hackeada: entenda gravidade e como proteger os dados da sua empresa. UOL, 17 out 2022. Disponível em: https://www.uol.com.br/tilt/noticias/redacao/2022/10/17/ataque-hacker-record-roubo-de-dados-pode-ter-sido-um-dos-maiores-do-mundo.htm. Acesso em: 11 novembro 2023.

SULTANA, Maliha et al. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics and Decision Making, v. 23, n. 1, p. 5, 2020.

RESEARCH TEAM, Checkpoint. Check Point Research: Cyber Attacks Increased 50% Year over Year. Check Point, 2022. Disponível em: https://blog.checkpoint.com/security/check-point-research-cyber-attacks-increased-50-year-over-year/. Acesso em: 15 novembro 2023.

HARPER, Colin. PWC GLOBAL SURVEY: CORPORATE INTEREST IN BLOCKCHAIN ON THE RISE. Bitcoin Magazine, 2018. Disponível em: https://bitcoinmagazine.com/business/pwc-global-survey-corporate-interest-blockchain-rise. Acesso em: 17 novembro 2023.

LAMOUNIER, Lucas. Blockchain Empresarial: A Transformação Industrial. 101 Blockchains, 2019. Disponível em: https://101blockchains.com/pt/blockchains-empresarial/. Acesso em: 17 novembro 2023.

SOARES, Carlos S.S. et al. BLOCKCHAIN E SEGURANÇA DA INFORMAÇÃO-FORTRESS OF SECURITY. Plural – Revista Acadêmica, v. 2, n. 3, p. 3, 2023.

Published

2024-08-24

How to Cite

Santos , V. G. dos, & Vitorio , W. M. (2024). Blockchain integration and zero trust model for data security in corporate networks. Journal of the Management and Technology Meeting, 1(07), e304. https://doi.org/10.5281/zenodo.13324038

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.