UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRCN06002


Registration ID:
214874

Page Number

4-6

Share This Article


Jetir RMS

Title

Security vulnerabilities of Digital Currencies and Countermeasures

Abstract

Crypto currency commonly defined as digital belongings that use cryptography to secure dealings without the need for a central banking authority is rising in popularity and being widely adopted across the globe. The market for crypto-currencies has been incredibly volatile and these peaks and troughs have made crypto currency value a popular media topic. Hackers, too, have taken notice. In a little under a decade, crypto currency has developed from an obscure experiment to one of the hottest topics in both the technology and finance fields. From the time when the emergence of Bitcoin as the first centralised crypto currency in 2009, the industry has exploded and there are more than 1,500 different currencies now existing. We have seen a new sharp rise in crypto-jacking attacks, exploiting the power of victims' computers to mine crypto-currency and alternative currencies also play a major role in ransom ware attacks, being the payment method of choice. Phishing is a key element in these attacks and businesses need to help their employees to spot phishing attacks. Credential theft is a serious driver of cybercrime today. The world over, different kinds of credentials are used by billions daily to authenticate themselves in their physical and digital lives. From physical keys, through tokens and cards, to digital private keys, session cookies, digital certificates, crypto-currency wallets, login and password combinations, all of these types of credentials are vulnerable to attack. This paper deals with the security vulnerabilities related to crypto currencies and the countermeasures to be taken by block chain to keep it safe.

Key Words

cyber-attacks, penetration

Cite This Article

"Security vulnerabilities of Digital Currencies and Countermeasures", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.4-6, May - 2019, Available :http://www.jetir.org/papers/JETIRCN06002.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Security vulnerabilities of Digital Currencies and Countermeasures", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp4-6, May - 2019, Available at : http://www.jetir.org/papers/JETIRCN06002.pdf

Publication Details

Published Paper ID: JETIRCN06002
Registration ID: 214874
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 4-6
Country: Chennai, Tamil Nadu, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002871

Print This Page

Current Call For Paper

Jetir RMS