YoVDO

Election Hacking Defined and How to Fight Back

Offered By: YouTube

Tags

Conference Talks Courses Data Mining Courses Cybersecurity Courses Data Protection Courses Denial-of-Service Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of election hacking and strategies to combat it in this 49-minute conference talk from BSidesCT 2019. Delve into the origins of hacking terminology, data mining techniques, and various attack vectors using the Hexad Model. Examine real-world examples from the United Kingdom and the Netherlands, and learn about defensive techniques and potential strategies to safeguard electoral processes. Gain insights into psychometrics, physical infrastructure vulnerabilities, denial of service attacks, information-based threats, and data exfiltration risks in the context of election security.

Syllabus

Introduction
Origins of this talk
Graduate Thesis
Origins of the term Hacking/Hacker
Data mining for answers
Election Hacking Heuristics
Defining attack vectors
Hexad Model
Psychometrics
Physical infrastructure attacks
Denial of Service attacks
Information based attacks
Exfiltration and Data theft attacks
Election Hacking - a
United Kingdom (UK)
The Netherlands
Defensive techniques
what other strategies might work?
Final thoughts..


Related Courses

[NEW] Cyber Security 2020
Udemy
Ethical Hacking: Denial of Service
Pluralsight
Impact with Slowloris
Pluralsight
Complete WiFi Hacking Course: Beginner to Advanced
Udemy
Programming Foundations: Web Security
LinkedIn Learning