Security
When utilizing Iroha 2—or any other blockchain ledger for that matter—security is paramount for financial organizations, as it forms the foundation of trust in an industry where sensitive financial data and transactions are routine. A successful security breach performed by a malicious party can lead to devastating consequences for you. Therefore establishing preemptive security measures is essential to protect the integrity and confidentiality of your sensitive data.
Navigation
In this section you can learn about various aspects of securing your Iroha 2 network. To learn more, choose one of the following topics:
The core security principles that individuals and organizations can adopt to protect their data and decrease the chance of a breach and/or leak.
Best practices for securing the day-to-day operations of your network, including access controls, monitoring, incident responses, the use of browsers, etc.
A deep-dive into password entropy, creating strong passwords and avoiding password vulnerabilities.
An introduction into public key cryptography, encryption, signatures, and their role in establishing secure communication within the blockchain.
Generating Cryptographic Keys:
Instructions on how to generate cryptographic keys and use
kagami
(a supporting tool shipped alongside Iroha 2).Best practices for securing your cryptographic keys with a number of different approaches that can also be combined.