Cyber Currency Hacker Target as the population of Blockchain applications expands.In the last year there was a boom in malicious cryptocurrency mining. That is where cyber attackers secretly hijack the processing power of computers, servers and even IoT devices and use it to mine for cryptocurrency. While it is not very lucrative in the short term, it is stealthy and can be sustained over a long period of time. Typically it is taking very little from each PC, most users don’t even know their machine’s processor is being used to line someone else’s pockets.
Ransomware a much more aggressive approach: pay up, or risk having your files permanently locked.
Both cryptojacking and ransomware continue to be widespread threats, other attackers are quietly deploy a potentially much more damaging threat: trojan malware.
Trojan malware sneaks onto your PC by disguising itself as something else, often hidden in a malicious attachment that’s distributed with a phishing email.
Trojan attacks range from those using commodity malware, with phishing emails spammed out in bulk in the hope of scooping up victims for the purposes of stealing their login credentials, banking information or other private information. Other attacks are far more precise, targeting organisations or even individuals to gain access to specific data or information: this can be for creating a persistence presence on their network for espionage, stealing data and selling it, or loading other malware onto the system.
Top 10 Blockchain Challenges – Janco Associates conduct a survey of IT Blockchain Project Managers in large and mid-sized corporations. 178 PMs participated in the study. All of the managers had been operating in that role for over one year and several had been project managers for well over five years. They all had at least 5 project team members and the largest project had over 60 IT professionals on it.
Top 10 Blockchain challenges are associated with the importance and priority of the associated development and implementation activities
Top 10 challenges identified by Janco are:
Coordination Internal/External requirements, specifications, and activities – 63%
Overworked with Manny work weeks that were well over 60 hours – 53%
Understaffed with scores of open requisitions that remained unfilled for months at a time – 51%
Changes in specifications both on the data and requirements that were moving targets – 47%
Changes coming too fast as more was done the rate of change increased at an ever-increasing rate – 42%
Technology New & Rapidly Changing as tools and available resources/tools keep evolving – 42%
Scalability of applications designed into the infrastructure architecture – 41%
Deadlines not agreed on and set arbitrarily by individuals not involved with the day-to-day development – 39%
Staff turnover as key members of the team are burned out and or hired away -34%
Staff skills gaps as many team members did not have all of the skills and experience necessary to complete tasks in a timely manner – 34%
Blockchain Education is Addressed by Several Universities
The blockchain job description was created with the assistance of two Fortune 100 CIOs.
Blockchain Education now is addressed by a number of universities. They understand that it is a hot evolving technology. Salaries for developers can reach $180,000. Late last year there were over 12,000 open positions – that was 4 times the number of open positions at the same time in the prior year.
Course address cyber currency (Bitcoin) and business scale blockchain networks. Some of the universities include:
Stanford University has a course called “Bitcoin Engineering”
UC Berkeley scheduled a two-course series which attracted 7,400 students before it was closed out. The topics were cryptocurrencies and business-scale blockchain networks.
MIT has two Instructors teaching Applied Blockchain.
Many other universities are addressing this area as well. It’s still very early in the game, so there is going to be that market for the hotshot blockchain technologist who will build systems and can hop from company to company and make a ton of money. But, if the promise comes through on the potential, there will be a lot of work in this space for many years, even a decade or more. This will be entrenched and deeply connected into the enterprise. It will be making money. It will be a core piece of the infrastructure.
Role of the Blockchain developer
The job description documents over 25 specific accountabilities for an individual in this role. Below are some of them:
Design groundbreaking software products with an eye toward compliance.
The subject-matter expert (SME) for the Blockchain applications including a knowledge of the top partners that make up our Blockchain segment globally.
Own the execution of the strategic plan for each market segment, which includes aligning with partner development managers who manage our top technology and consulting partners focused on Blockchain, maximizing influenced revenue driven with and through partners
Working with partner development managers, build C-level relationships with our top partners and generate interest in new programs focused on DevOps/Tools
Represent the partner strategy for Blockchain to our internal and external stakeholders including the sales teams as well as media coverage and industry events focused on the Blockchain segment
Universities Work Together On Payment System – Shades of Internet Development
Universities Work Together On Payment System just like they did when the Internet was developed by them in the late 1960’s with ARPAnet.
Blockchain payment system must smoothly collect, process, and protect sensitive personal information
Several universities, including MIT and Stanford, are working together to develop a digital currency network that solves blockchain’s scalability and performance problems before public confidence in the technology erodes.
Funded by a Swiss-based non-profit organization, the cryptocurrency application, called Unit-e, and its blockchain-based payment system is expected to launch in the second half of this year; if successful, it would surpass even mainstream financial networks like Visa’s VisaNet in transactional capability.
This is very similiar to how the Internet was first developed. Universitiy staff and associates worked together to create a common netwok which was in competition with the then exisiting TimeSharing services. None of which exist today.
The question is will propritary systems like VisaNet exist after the public university system is operational. Research shows that well-run companies are most productive, suffer the least loss of sensitive data, and have less downtime of operations if they have good policies in in place.