Главная
Study mode:
on
1
Introduction
2
Origins of this talk
3
Graduate Thesis
4
Origins of the term Hacking/Hacker
5
Data mining for answers
6
Election Hacking Heuristics
7
Defining attack vectors
8
Hexad Model
9
Psychometrics
10
Physical infrastructure attacks
11
Denial of Service attacks
12
Information based attacks
13
Exfiltration and Data theft attacks
14
Election Hacking - a
15
United Kingdom (UK)
16
The Netherlands
17
Defensive techniques
18
what other strategies might work?
19
Final thoughts..
Description:
Explore the concept of election hacking and strategies to combat it in this 49-minute conference talk from BSidesCT 2019. Delve into the origins of hacking terminology, data mining techniques, and various attack vectors using the Hexad Model. Examine real-world examples from the United Kingdom and the Netherlands, and learn about defensive techniques and potential strategies to safeguard electoral processes. Gain insights into psychometrics, physical infrastructure vulnerabilities, denial of service attacks, information-based threats, and data exfiltration risks in the context of election security.

Election Hacking Defined and How to Fight Back

Add to list