Blockchain integration and zero trust model for data security in corporate networks
DOI:
https://doi.org/10.5281/zenodo.13324038Keywords:
Corporate Networks, Blockchain, Zero Trust, Data SecurityAbstract
Data security and integrity are becoming increasingly important in the corporate world. With the rise of blockchain, companies are adopting the technology for its security features such as data encryption, immutability and integrity of information, and its decentralized network. There are many different network security strategies and models, but the combination of the zero trust model with blockchain networks is likely to prove efficient and effective for those who want more security for their data. This article was made to review and analyze the contents currently available through a qualitative approach, to which the bibliographic research procedure is applied for validation of the theme. The purpose of this article is to disseminate the knowledge of new security technologies to reduce the risk of attacks on corporate networks. Based on concepts such as not trusting any user or device, the zero trust model adds a security layer that, when integrated with blockchain networks, can be an effective solution to improve the security and transparency of corporate networks.
Downloads
References
O que é uma VPN?. CLOUDFLARE, 2023. Disponível em: https://www.cloudflare.com/pt-br/learning/access-management/what-is-a-vpn/. Acesso em: 16 novembro 2023.
Segurança de rede Castelo e Fosso. CLOUDFLARE, 2023. Disponível em: https://www.cloudflare.com/pt-br/learning/access-management/castle-and-moat-network-security/. Acesso em: 16 novembro 2023.
O que é uma rede Zero Trust? CLOUDFLARE, 2023. Disponivel em: https://www.cloudflare.com/pt-br/learning/security/glossary/what-is-zero-trust/. Acesso em: 15 novembro 2023.
THALES, 2022 Thales Data Threat Report: Navigating Data Security in an Era of Hybrid Work, Ransomware and Accelerated Cloud Transformation, Global Edition, 2022. Disponível em: https://cpl.thalesgroup.com/sites/default/files/content/research_reports_white_papers/field_document/2022-03/2022-data-threat-report-global-edition.pdf. Acesso em: 16 novembro 2023.
THALES, 2022 Thales Data Threat Report: Navigating Data Security in an Era of Hybrid Work, Ransomware and Accelerated Cloud Transformation, Emea Edition, 2022. Disponível em: https://www.exclusive-networks.com/se/wp-content/uploads/sites/25/2022/06/2022-thales-data-threat-report-emea-edition.pdf. Acesso em: 16 novembro 2023.
APPS, Spinning Cloud. Zero Trust Security: Everything You Need to Know. Security Boulevard, 2022.
Disponível em: https://securityboulevard.com/2022/11/zero-trust-security-everything-you-need-to-know/. Acesso em: 15 novembro 2023.
KIME, Chad. Whitelisting vs Blacklisting: How Are They Different? eSecurity Planet, 2023. Disponível em: https://www.esecurityplanet.com/applications/whitelisting-vs-blacklisting-which-is-better/. Acesso em: 15 novembro 2023.
GOSS, Michaela. VPN vs. zero trust vs. SDP: What's the difference? TechTarget. 2022. Disponível em:https://www.techtarget.com/searchnetworking/feature/SDP-vs-VPN-vs-zero-trust-networks-Whats-the-difference. Acesso em: 15 novembro 2023.
INFRA. Tendências de segurança cibernética para 2023. 4INFRA, 2023. Disponível em: https://4infra.com.br/tendencias-de-seguranca-cibernetica/#:~:text=Conhe%C3%A7a%20as%20tend%C3%AAncias%20de%20seguran%C3%A7a,padr%C3%A3o%20Zero%20Trust%20e%20computa%C3%A7%C3%A3o. Acesso em: 18 novembro 2023.
BINOJ, SS. Enhancing Cybersecurity with Zero Trust and Blockchain Technology. LinkedIn, 2023. Disponível em: https://www.linkedin.com/pulse/enhancing-cybersecurity-zero-trust-blockchain-technology-s-s/. Acesso em: 18 novembro 2023.
OKABAYASHI, Mitie. Segurança de dados e Blockchain: entenda as relações. Rípio, 2022. Disponível em: https://launchpad-br.ripio.com/blog/seguranca-de-dados-e-blockchain-entenda-as-relacoes. Acesso em: 18 novembro 2023.
COELHO, Beatriz. Os diferentes tipos de pesquisa científica. Qual se aplica melhor a você? Mettzer, 2019. Disponível em: https://blog.mettzer.com/tipos-de-pesquisa/. Acesso em: 16 novembro 2023.
Guia de infraestrutura e proteção de rede. UPX, 2021. Disponível em: https://upx.com/post/infraestrutura-protecao-de-rede/. Acesso em: 15 novembro 2023.
MULLINS, Heath. Embrace proactive security with Zero Trust. Microsoft, 2023. Disponível em: https://www.microsoft.com/en-us/security/business/zero-trust. Acesso em: 17 novembro 2023.
DIAS, Gabriel. Record hackeada: entenda gravidade e como proteger os dados da sua empresa. UOL, 17 out 2022. Disponível em: https://www.uol.com.br/tilt/noticias/redacao/2022/10/17/ataque-hacker-record-roubo-de-dados-pode-ter-sido-um-dos-maiores-do-mundo.htm. Acesso em: 11 novembro 2023.
SULTANA, Maliha et al. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics and Decision Making, v. 23, n. 1, p. 5, 2020.
RESEARCH TEAM, Checkpoint. Check Point Research: Cyber Attacks Increased 50% Year over Year. Check Point, 2022. Disponível em: https://blog.checkpoint.com/security/check-point-research-cyber-attacks-increased-50-year-over-year/. Acesso em: 15 novembro 2023.
HARPER, Colin. PWC GLOBAL SURVEY: CORPORATE INTEREST IN BLOCKCHAIN ON THE RISE. Bitcoin Magazine, 2018. Disponível em: https://bitcoinmagazine.com/business/pwc-global-survey-corporate-interest-blockchain-rise. Acesso em: 17 novembro 2023.
LAMOUNIER, Lucas. Blockchain Empresarial: A Transformação Industrial. 101 Blockchains, 2019. Disponível em: https://101blockchains.com/pt/blockchains-empresarial/. Acesso em: 17 novembro 2023.
SOARES, Carlos S.S. et al. BLOCKCHAIN E SEGURANÇA DA INFORMAÇÃO-FORTRESS OF SECURITY. Plural – Revista Acadêmica, v. 2, n. 3, p. 3, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Vinicius Gadelha dos Santos , Walison Martins Vitorio
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Engetec em Revisa © 2024 by Fatec da Zona Leste is licensed under CC BY-NC-SA 4.0
Copyright Policy
By submitting a manuscript for publication in EnGeTec em Revista, the authors agree, in advance and unrestrictedly, to the following terms:
- The authors retain the copyright and grant EnGeTec em Revista the right of first publication of the manuscript, without any financial burden, and renounce any other remuneration for its publication in EnGeTec em Revista.
- When submitted to EnGeTec em Revista, the manuscript is automatically licensed under the Creative Commons Attribution License, which allows the sharing of the work with acknowledgment of authorship and initial publication in EnGeTec em Revista.
- Authors are authorized to enter into additional contracts separately, for non-exclusive distribution of the version of the work published in EnGeTec em Revista (publish in repositories or as a book chapter), with acknowledgment of the initial publication in EnGeTec em Revista, provided that such agreement does not imply an endorsement of the content of the manuscript or of the new vehicle by EnGeTec em Revista.
- Authors are allowed and encouraged to publish and distribute their work online, in institutional repositories, for example after the editorial process is completed.
- The authors warrant that they have obtained proper permission from their employers for the transfer of rights under this agreement, if those employers own any copyright in the manuscript. In addition, the authors assume any and all responsibility for possible infringements of the copyright of these employers, exempting EnGeTec em Revista from any and all liability in this regard.
- The authors assume all responsibility for the content of the work, including the due and necessary authorizations for data disclosure. collected and results obtained, exempting EnGeTec em Revista from any and all responsibility in this regard.