0% found this document useful (0 votes)
37 views

The Use of Blockchain Technology in The Field of Education

The document discusses implementing blockchain technology in education to improve security and tracking of student records and credentials. It analyzes types of blockchain implementation, areas of application in Kazakhstan, and advantages. It also discusses analyzing cybersecurity issues in educational institutions, implementing blockchain at the software and application levels, and addressing key vulnerabilities with blockchain best practices.

Uploaded by

Nurbazarova Erke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

The Use of Blockchain Technology in The Field of Education

The document discusses implementing blockchain technology in education to improve security and tracking of student records and credentials. It analyzes types of blockchain implementation, areas of application in Kazakhstan, and advantages. It also discusses analyzing cybersecurity issues in educational institutions, implementing blockchain at the software and application levels, and addressing key vulnerabilities with blockchain best practices.

Uploaded by

Nurbazarova Erke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Astana IT University

The use of Blockchain technology


in the field of education

Security Defense Competition, Aaso Ziro

CS-2008

Yerkezhan Nurbazarova,
Utegen Nurai, Batyrbek Baitanatov

CONTENT
Introduction
Blockchain and the types of its implementation within the framework of the
justification of the security structure.
Analysis of the technology of the blockchain and the principle of operation
Areas of application of blockchain in Kazakhstan.
Advantages of using blockchain
Block structures
Analysis of cybersecurity in educational institutions.
Platforms providing protection
Implementation of blockchain at the software level.
Implementation of blockchain technology in the field of education and
development of recommendations..
Scheme of application protection with the DJANGO framework and the
security reaction of the blockchain
TSHARK at the server level.
Elimination of major vulnerabilities with the use of blockchain and key
recommendations
Conclusion
INTRODUCTION
The research novelty
lies in the implementation of Blockchain
technology in the field of education and
the development of recommendations
for eliminating vulnerabilities.

The theoretical significance


of scientific work
lies in the introduction of blockchain
technologies in educational and
academic institutions.
INTRODUCTION

The practical significance of Objectives and


the scientific work objectives
lies in proving the optimality of the of the study Analyze the types of
proposed method of ensuring implementation of the blockchain,
information security for the IT and take the most optimal and best
system Astana IT University, which for use, consider the scope of
can be used in this educational application of the blockchain in
institution. Kazakhstan,
The object of
the study
is modern blockchain platforms
and the educational sphere
BLOCKCHAIN

What is
The main difference
Blockchain?

this is one of the ways of Decentralization. That is, firstly, no


distributed data storage. This regulator or organization monitors this
technology can be used to process. And secondly, the information is
record and track any type of not concentrated, say, on servers in one
information: from medical place, but is distributed in a huge network
indicators to elections. of computers around the world.

How the Blockchain Who invented the


Works blockchain
Blockchain is a chain of blocks. In each of It is believed that the distributed registry
these blocks, one or another information is technology was invented by Satoshi
digitally recorded. In the case of Nakamoto in 2008 as a registry for the first
cryptocurrencies, this is transaction data world cryptocurrency — bitcoin. However, it is
(date and time of block creation, address, not known for certain whether there is
etc.). Any user can view this information, actually a person with such a name or it is a
but cannot change it. pseudonym behind which a whole group of
people is hiding.
Areas of application of
blockchain in Kazakhstan

According to the instructions of the head of state, the


National Association for the Development of Blockchain and
Crypto Technologies operates in the country, which intends
to integrate Kazakhstan into the global blockchain
ecosystem, as well as the Kazakhstan Association of
Blockchain and Cryptocurrencies (CABC). In addition, IT
clusters are being created in Kazakhstan, in which
acceleration programs have already begun to work.
Last year, the Kazakhstan Association of Blockchain and
Cryptocurrencies signed memorandums of cooperation
with the profile associations of South Korea, Russia and
Belarus, with the leading university of Kazakhstan - Narxoz,
with the Astana International Financial Center, with the
Autonomous Cluster Fund "Park of Innovative Technologies".
Representatives of CABCs work in Singapore, the UAE,
Russia, Belarus, Uzbekistan, Kyrgyzstan and Lithuania.
Advantages of using Blockchain
The introduction of blockchain technologies in educational
01 institutions will avoid the main security problems

02 Ransomware viruses will no longer become


such a big problem for educational institutions

03 Personal information in the blockchain


is protected by cryptography

04 DDOS attacks will become less dangerous


as traffic will be distributed.

Homomorphic
05 encryption.
Block structures

The first logical step is to determine the structure of


the block. To keep everything as simple as possible,
we included only the most necessary: index, mark,
data, hash and hash of the previous block
ANALYSIS OF CYBERSECURITY IN EDUCATIONAL
INSTITUTIONS
Security Platforms

Human
Information can be stolen by copying to temporary media,
forwarded by e-mail. In addition, if you have access to the
server, changes to the databases can be made manually

Program
For theft of information, special programs are used that
provide copying passwords, copying and intercepting
information, redirecting traffic, decrypting, making changes to
the work of other programs.

Hardware
It is associated either with the use of special technical means,
or with the interception of electromagnetic radiation through
various channels, including telephone channels.
Implementing blockchain
at the software level

There is a six-tier
blockchain
architecture thanks
to which the
structure works
correctly.
IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN
THE FIELD OF EDUCATION AND DEVELOPMENT OF
RECOMMENDATIONS

Application Security Diagram with Framework Django and


Blockchain Security Response

With the help of The winners will also be


Students will independently
decentralized storage and teachers who will be able to
choose a qualified teacher,
general availability of receive honest percentages
which will significantly
information, it will be possible of lectures and seminars,
reduce the level of scientific
to track each diploma, check regardless of a clearly fixed
illiteracy.
it for authenticity. university salary.
Tshark at the server level
Since the blockchain is at least one of the most
secure and persistent systems, you still need
to think about how to implement 99% protection
against attacks, DDoS attacks and other
external attacks. And thanks to our research, we
came across one application that will help us
remotely monitor the "state" of our blockchain.
This is Tshark.

In practice, system administration quite often has to deal with


complex situations in which neither statistics collection tools (for
example, netstat), nor standard utilities based on the ICMP
protocol (ping, traceroute and others) help. In such cases,
specialized diagnostic utilities are often used that make it
possible to "listen" to network traffic and analyze it at the level of
transmission units of individual protocols. They are called traffic
analyzers, and in professional jargon they are called sniffers.
With their help, you can, firstly, localize network problems and
diagnose them more accurately, and secondly, detect parasitic
traffic and identify malicious software in the network
Addressing Key Vulnerabilities Using
Blockchain Technology and Best
Practices

Vector 76 attack Attack 51%

Eclipse Attack
CONCLUSION
Blockchain can make this remarkable
revolution quickly and internationally,
without any central authority to
manage.

You might also like