Trust, but Verify - Maintaining Democracy In Spite of Information Countermeasures

Trust, but Verify - Maintaining Democracy In Spite of Information Countermeasures

Hack In The Box Security Conference via YouTube Direct link

WHAT CAN WE DO TO PROTECT DEMOCRACY?

13 of 14

13 of 14

WHAT CAN WE DO TO PROTECT DEMOCRACY?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Trust, but Verify - Maintaining Democracy In Spite of Information Countermeasures

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 MASLOW'S HIERARCHY OF NEEDS
  3. 3 WHERE DOES VOTING FIT?
  4. 4 PHYSIOLOGICAL NEEDS
  5. 5 SELF- ACTUALIZATION
  6. 6 VOTER HIERARCHY OF NEEDS
  7. 7 LAYERS FOR ATTACKERS TO TARGET
  8. 8 INFORMATION PLANE
  9. 9 INFRASTRUCTURE PLANE
  10. 10 And lets not forget 2016, when San Francisco's transit system was infected
  11. 11 WHERE DOES THAT LEAVE US?
  12. 12 HOW WOULD YOU ATTACK?
  13. 13 WHAT CAN WE DO TO PROTECT DEMOCRACY?
  14. 14 DOWNLOAD THE ELECTION SECURITY WHITE PAPER

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.