Election Hacking Defined and How to Fight Back
Offered By: YouTube
Course Description
Overview
Explore the concept of election hacking and strategies to combat it in this 49-minute conference talk from BSidesCT 2019. Delve into the origins of hacking terminology, data mining techniques, and various attack vectors using the Hexad Model. Examine real-world examples from the United Kingdom and the Netherlands, and learn about defensive techniques and potential strategies to safeguard electoral processes. Gain insights into psychometrics, physical infrastructure vulnerabilities, denial of service attacks, information-based threats, and data exfiltration risks in the context of election security.
Syllabus
Introduction
Origins of this talk
Graduate Thesis
Origins of the term Hacking/Hacker
Data mining for answers
Election Hacking Heuristics
Defining attack vectors
Hexad Model
Psychometrics
Physical infrastructure attacks
Denial of Service attacks
Information based attacks
Exfiltration and Data theft attacks
Election Hacking - a
United Kingdom (UK)
The Netherlands
Defensive techniques
what other strategies might work?
Final thoughts..
Related Courses
[NEW] Cyber Security 2020Udemy Ethical Hacking: Denial of Service
Pluralsight Impact with Slowloris
Pluralsight Complete WiFi Hacking Course: Beginner to Advanced
Udemy Programming Foundations: Web Security
LinkedIn Learning