Abstract

In the 21st century, we are at the verge where emerging technologies are growing at the fast pace and it is important to seek existing researches related to application of block chain technology and It is significant to distinguish the current explores explicitly identified with the use of block chain as to see would we say we are shielded from unapproved access security penetrates? This paper sums up significant information security issues which are managed by block chain and plays out a significant natural investigation of every issue. In this paper, we expect to overview key provokes identified with existing information sharing stages which rely upon confided in outsider (TTP) and on security and protection issues identified with it and how these can be settled utilizing the block chain and data science innovation. What are the tools and techniques, algorithms provided by Block chain or data science technology for cyber security, network security, information and data security. Also, another objective is to presents the merits and demerits of Block chain over data security in different sectors of the organizations and we will focus on cyber security data science (CDS), which is broadly related to these areas in terms of security data processing techniques and intelligent decision making in real-world applications. Overall, CDS is security data-focused, applies machine learning methods to quantify cyber risks, and ultimately seeks to optimize cyber security operations.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.