Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Election Hacking Defined and How to Fight Back

via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the concept of election hacking and strategies to combat it in this 49-minute conference talk from BSidesCT 2019. Delve into the origins of hacking terminology, data mining techniques, and various attack vectors using the Hexad Model. Examine real-world examples from the United Kingdom and the Netherlands, and learn about defensive techniques and potential strategies to safeguard electoral processes. Gain insights into psychometrics, physical infrastructure vulnerabilities, denial of service attacks, information-based threats, and data exfiltration risks in the context of election security.

Syllabus

Introduction
Origins of this talk
Graduate Thesis
Origins of the term Hacking/Hacker
Data mining for answers
Election Hacking Heuristics
Defining attack vectors
Hexad Model
Psychometrics
Physical infrastructure attacks
Denial of Service attacks
Information based attacks
Exfiltration and Data theft attacks
Election Hacking - a
United Kingdom (UK)
The Netherlands
Defensive techniques
what other strategies might work?
Final thoughts..

Reviews

Start your review of Election Hacking Defined and How to Fight Back

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.