{"title":"使用区块链技术的网络安全研究及其在教育中的应用","authors":"Satyam Anand","doi":"10.32628/ijsrst524111100","DOIUrl":null,"url":null,"abstract":"Present paper discussed about Blockchain Technology and its application in Education. Cybersecurity offers protection from cyberattacks for protected data on internet-connected devices as well as for hardware and software. A set of regulations, guidelines, and laws that apply to hardware, software, programmers, and secure information provide defense against dangers from without, such as destruction, theft, manipulation, and unauthorized access [1]. The words \"cyber\" and \"security\" are combined to form the compound word \"cybersecurity.\" The network of protected devices, services, networks, and data is referred to as \"cyber\". On the other hand, security is concerned with safeguarding data, networks, applications, and systems. The application of blockchain technology to improve data security, dependability, and device security has increased significantly in a number of industries in recent years [3]. A number of cryptographically chain blocks can be eagerly decoded from the blockchain technology.","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":"74 8","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Study of Web Security Using Blockchain Technology and Its Application in Education\",\"authors\":\"Satyam Anand\",\"doi\":\"10.32628/ijsrst524111100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Present paper discussed about Blockchain Technology and its application in Education. Cybersecurity offers protection from cyberattacks for protected data on internet-connected devices as well as for hardware and software. A set of regulations, guidelines, and laws that apply to hardware, software, programmers, and secure information provide defense against dangers from without, such as destruction, theft, manipulation, and unauthorized access [1]. The words \\\"cyber\\\" and \\\"security\\\" are combined to form the compound word \\\"cybersecurity.\\\" The network of protected devices, services, networks, and data is referred to as \\\"cyber\\\". On the other hand, security is concerned with safeguarding data, networks, applications, and systems. The application of blockchain technology to improve data security, dependability, and device security has increased significantly in a number of industries in recent years [3]. A number of cryptographically chain blocks can be eagerly decoded from the blockchain technology.\",\"PeriodicalId\":14387,\"journal\":{\"name\":\"International Journal of Scientific Research in Science and Technology\",\"volume\":\"74 8\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific Research in Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32628/ijsrst524111100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Research in Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32628/ijsrst524111100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study of Web Security Using Blockchain Technology and Its Application in Education
Present paper discussed about Blockchain Technology and its application in Education. Cybersecurity offers protection from cyberattacks for protected data on internet-connected devices as well as for hardware and software. A set of regulations, guidelines, and laws that apply to hardware, software, programmers, and secure information provide defense against dangers from without, such as destruction, theft, manipulation, and unauthorized access [1]. The words "cyber" and "security" are combined to form the compound word "cybersecurity." The network of protected devices, services, networks, and data is referred to as "cyber". On the other hand, security is concerned with safeguarding data, networks, applications, and systems. The application of blockchain technology to improve data security, dependability, and device security has increased significantly in a number of industries in recent years [3]. A number of cryptographically chain blocks can be eagerly decoded from the blockchain technology.