2.4 Security Layer
In this paper, we will limit what we disclose about the security protocols to avoid providing attack vectors to potential attackers. We not only use the post quantum safe encryption but also quantum source of randomness because of the importance of data security.
These will get triggered every time:
Data moves into the infrastructure
Data moves out of the infrastructure
Data is updated in the infrastructure
Among others, we will use the following techniques to verify the integrity and authenticity of the data as it enters:
Checksums
Quantum-safe cryptographic signatures
Anomaly detection algorithms (a mix of deterministic algorithms and machine learning models)
This helps to detect and block corrupt or malicious data entering the system and getting stored.
Consistently ensuring the integrity of data within the platform is critical for:
Building trust among users and stakeholders
Ensuring continued regulatory compliance for HumanChain and all its stakeholders
Machine learning models and other fraud prevention algorithms will run passively to monitor and scan the data infrastructure for attempts at fraud. Continuous, passive monitoring and analysis of data access & modification patterns will ensure that any anomalous or potentially fraudulent activity can be detected and flagged in real-time, preventing damage before it becomes extensive.
Automated response mechanisms like alerting admins, isolating affected data, and temporarily restricting access shall be used to minimize impact.
Furthermore, the passive fraud prevention system is one component of a layered security architecture at HumanChain.
Protects against Fake profiles, Sybil attacks, pollution of data sets
Intrusion Detection Systems (IDS) to monitor and analyze network traffic for signs of suspicious activity that could indicate a breach or a fraud attempt.
Firewalls and Endpoint Protection: Firewalls to defend against external threats and endpoint protection to secure individual devices accessing the network.
Regular Audits and Updates
Compliance and security audits
System updates
Incident Response processes and procedures for isolating affected systems, conducting forensic analysis and restoring services
Comprehensive backup and disaster recovery solutions
Last updated