Cyber Chain – Merging Blockchain with Cyber Security
DOI:
https://doi.org/10.22399/ijasrar.42Keywords:
Cyber chain, blockchain, cyber securityAbstract
The new digital economy is plagued by profound flaws because it relies on centralised systems
with a single control point that are attractive and easy targets for cyber attackers. This study
examines how Blockchain Technology can remedy these inherent security vulnerabilities.
Blockchain is powerful due to three central properties: decentralisation, data dispersed among
numerous computers, cryptographic linking applying maths codes to protect data, and
immutability, data records that cannot be altered.This paper discusses how BT develops Self-Sovereign Identity SSI systems, providing
individuals with complete control of their digital IDs and preventing mass identity theft. It
further discusses its applications in securing IoT devices and verifying the integrity and
authenticity of essential information. Key findings distilled from existing literature affirm the
technology's potential but outline principal stumbling blocks, such as the problem of scalability,
system velocity and legal disputes with data privacy legislation, such as the right to be
forgotten. The research concludes that concentrated development on standardised enterprise
solutions will render blockchain a critical, new layer of contemporary cyber security protection.
References
1. U.S. House Committee on Financial Services. (2025, September 22). Oversight and
Investigations Subcommittee Evaluates Growing Threat of Financial Fraud to American
Consumers. Retrieved from
https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=410882
2. PurpleSec. (2025, September 22). Common Types of Network Security Vulnerabilities.
Retrieved from https://purplesec.us/learn/common-network-vulnerabilities/
3. Wisconsin Bank & Trust. (2025, September 22). Identity Theft in the Digital Age: How to
Protect Your Dat
4. a Privacy from Fraudsters. Retrieved from
https://www.wisconsinbankandtrust.com/resources/blog-post/identity-theft-digital-age
how-protect-your-data-privacy-fraudsters
5. Freeman Law. (2025, September 22). Blockchain Technology Explained: What is
Blockchain and How Does It Work? Retrieved from https://freemanlaw.com/blockchain
technology-explained-what-is-blockchain-and-how-does-it-work-2/
6. Oxford Academic. (2025, September 22). Governance and Societal Impact of
Blockchain-Based Self-Sovereign Identities. Policy and Society. Retrieved from
https://academic.oup.com/policyandsociety/article/41/3/402/6607711
6
7. LA Blockchain Summit. (2025, September 22). Blockchain vs. Traditional Databases:
Key Differences. Retrieved from https://lablockchainsummit.com/blockchain-key
concepts/traditional-database-vs-blockchain
8. Rapid Innovation. (2025, September 22). Blockchain vs. Traditional Databases: Ultimate
Enterprise Guide 2024. Retrieved from https://www.rapidinnovation.io/post/enterprise
blockchain-vs-traditional-databases-comprehensive-comparison
9. PixelPlex. (2025, September 22). Blockchain Database vs Traditional Database:
Choosing the Best For Your Project. Retrieved from https://pixelplex.io/blog/blockchain
database-vs-traditional-database/
10. Okta. (2025, September 22). Decentralized Identity: The Future of Digital Identity
Management. Retrieved from https://www.okta.com/blog/identity-security/what-is
decentralized-identity/
11. The King’s Mark. (2025, September 22). Decentralization, Immutability, Transparency,
Security. Retrieved from https://kingmarked.com/docs/decentralization-immutability
transparency-security/
12. GeeksforGeeks. (2025, September 22). Role of Blockchain in Cybersecurity. Retrieved
from https://www.geeksforgeeks.org/computer-networks/role-of-blockchain-in
cybersecurity/
13. Web Asha Technologies. (2025, September 22). How Blockchain is Solving Modern
Cybersecurity Challenges. Retrieved from https://www.webasha.com/blog/how
blockchain-is-solving-modern-cybersecurity-challenges
14. Spydra. (2025, September 22). Decoding Blockchain Immutability: What Keeps Networks
Unchangeable? Retrieved from https://www.spydra.app/blog/decoding-blockchain
immutability-what-keeps-networks-unchangeable
15. MojoAuth. (2025, September 22). Securing the Future: Blockchain-Based Audit Trails in
IAM, Passwordless, Threat, and Breach Contexts. Retrieved from
https://mojoauth.com/ciam-101/blockchain-audit-trails-iam-passwordless-threat-breach
16. IBM. (2025, September 22). What Is Blockchain Security? Retrieved from
https://www.ibm.com/think/topics/blockchain-security
17. Amazon Web Services (AWS). (2025, September 22). What Is Blockchain? Retrieved
from https://aws.amazon.com/what-is/blockchain/
18. Dock Labs. (2025, September 22). Self-Sovereign Identity: The Ultimate Guide 2025.
Retrieved from https://www.dock.io/post/self-sovereign-identity
19. Integritee Network. (2025, September 22). Blockchain and Cybersecurity: Can
Decentralization Solve the Biggest Security Challenges? Medium. Retrieved from
https://medium.com/integritee/blockchain-and-cybersecurity-can-decentralization-solve
the-biggest-security-challenges-b93f72cf9394
20. MyShyft. (2025, September 22). Blockchain Audit Trails: Revolutionizing Enterprise
Scheduling Technology. Retrieved from https://www.myshyft.com/blog/blockchain-for
audit-trails/
21. IBM. (2025, September 22). Blockchain for Supply Chain. Retrieved from
https://www.ibm.com/solutions/blockchain-supply-chain
22. Deloitte. (2025, September 22). Using Blockchain to Drive Supply Chain Transparency
and Innovation.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Applied Sciences and Radiation Research

This work is licensed under a Creative Commons Attribution 4.0 International License.