Cryptocurrency and Blockchains outlines many of the key developments in building a more trustworthy world. It includes a background within the main methods used within creating data infrastructure which use Blockchain methods, and how these will change existing methods of authentication and identity provision. This will include a discussion of a range of application areas including with health care, law, finance and government services, and how smart contracts can be used to make transactions more trustworthy.Within the cryptocurrency part, the book outlines the trust infrastructure within the main cryptocurrency methods and around the usage of electronic tokens to transfer credits.An important element of the book is to look forwards a world where every transaction is made trustworthy, and were privacy requirements are respected.

The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems.GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.

Cryptography

by William J Buchanan

Published 31 August 2017
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.

The book has many novel features including:
- full provision of Web-based material on almost every topic covered
- provision of additional on-line material, such as videos, source code, and labs
- coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)

Key areas covered include:
- Fundamentals of Encryption
- Public Key Encryption
- Symmetric Key Encryption
- Hashing Methods
- Key Exchange Methods
- Digital Certificates and Authentication
- Tunneling
- Crypto Cracking
- Light-weight Cryptography
- Blockchain
- Zero-knowledge Proofs

This book provides extensive support through the associated website of: http://asecuritysite.com/encryption