YoVDO

Election Hacking Defined and How to Fight Back

Offered By: YouTube

Tags

Conference Talks Courses Data Mining Courses Cybersecurity Courses Data Protection Courses Denial-of-Service Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of election hacking and strategies to combat it in this 49-minute conference talk from BSidesCT 2019. Delve into the origins of hacking terminology, data mining techniques, and various attack vectors using the Hexad Model. Examine real-world examples from the United Kingdom and the Netherlands, and learn about defensive techniques and potential strategies to safeguard electoral processes. Gain insights into psychometrics, physical infrastructure vulnerabilities, denial of service attacks, information-based threats, and data exfiltration risks in the context of election security.

Syllabus

Introduction
Origins of this talk
Graduate Thesis
Origins of the term Hacking/Hacker
Data mining for answers
Election Hacking Heuristics
Defining attack vectors
Hexad Model
Psychometrics
Physical infrastructure attacks
Denial of Service attacks
Information based attacks
Exfiltration and Data theft attacks
Election Hacking - a
United Kingdom (UK)
The Netherlands
Defensive techniques
what other strategies might work?
Final thoughts..


Related Courses

Introduction to Data Science
University of Washington via Coursera
Big Data Analytics in Healthcare
Georgia Institute of Technology via Udacity
More Data Mining with Weka
University of Waikato via Independent
Mining Massive Datasets
Stanford University via edX
Pattern Discovery in Data Mining
University of Illinois at Urbana-Champaign via Coursera