Set as Homepage - Add to Favorites

日韩欧美成人一区二区三区免费-日韩欧美成人免费中文字幕-日韩欧美成人免费观看-日韩欧美成人免-日韩欧美不卡一区-日韩欧美爱情中文字幕在线

【????? ?????? ?????】How the U.S. can defend its elections from cyberattacks

Amid the cybersecurity whirlwind that has been May and ????? ?????? ?????June—when the world got its first taste of what widespread ransomware attacks are capable of(WannaCry) and the continued wave of attacks that is still unfolding globally(Petya/NonPetya)—the public’s attention has yet again been pulled away from the news most relevant to the United States and our future: A Department of Homeland Security (DHS) official in Trump’s administration confirmed that Russiatargeted election-related systems in 21 states ahead of the 2016 presidential election.

In the wake of all the recent ransomware news and last year’s Russian cyberattacks, a new 2017 survey by Carbon Black found that 27 percent of eligible U.S. voters “will consider not voting” in the future elections because of their concerns regarding cybersecurity. This means that in the next presidential election, 58.8 million people might not vote. With the 2018 mid-term election drawing near, this could have dire consequences on the future of voting in our country.

As a result of the 2016 cyber attacks, the U.S. learned what security experts have shouted for years: We are vulnerable! While we have significant potential for cyber defense and offense, we are plagued by internal breaches like those that released CIA attack tools and external compromises such as the Shadow Broker attack on the NSA. Noting this imbalance, Russia launched a targeted disruption campaign against the U.S., not specifically to change votes or directly alter the election, but to sow mistrust and concerns among American citizens.


You May Also Like

What can be done to prevent election hacking in 2018 and beyond? Can we restore faith in the American voting system, or is the damage already done?

The government must heed Comey’s words: 'They will be back'

The 2016 election cyber attacks had a silver lining: voters are starting to open their eyes to the problem. It is now the task of lawmakers to regain the trust of the public by creating public-private partnerships that seek to extend and broaden the scope of effective cybersecurity; spend funds on critical infrastructure protection to harden against cyber attacks; assist in educating the general population to beware of social engineering and email phishing attacks; and share known exploits and issues so that organizations can patch systems ahead of the attack.

In our last election, 25 percent of Americans voted using electronic voting machines. Many of these machines used outdated software on aged machines with inadequate cybersecurity. Thus, the potential for meddling with these machines is there, and our dependence on electronic voting machines may create an unnecessary vulnerability in our election process.

Therefore, in order to restore the public’s confidence in our voting process it is crucial that we invest in hiring and infrastructure to support hand-voting in the majority of areas until electronic voting can be made secure. Marking a paper ballot that can later be used to verify a vote will make our future elections as secure as possible and help the country trust our election process again.

Mashable Trend Report Decode what’s viral, what’s next, and what it all means. Sign up for Mashable’s weekly Trend Report newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

Citizens can also take cybersecurity into their own hands

While the government needs to make adjustments in order to preserve the integrity of our voting system, citizens too can take a proactive approach to ensure that they aren’t victims of the next cyber attack.

If nothing else, the 2016 election attacks demonstrated that we are all vulnerable to the simplest email phishing ploys. To better protect the integrity of our voting system, citizens need to leverage advances in cybersecurity technology and develop processes to make it difficult for Russia (or any adversary) to succeed in future attacks.

A few general rules for individuals to follow in order to avoid email hacking:

  • Don’t click links or open attachments in email unless the email is first verified

  • Use authentication and encryption to protect data if a compromise occurs

  • Deploy numerous verification techniques like two-factor authentication to set up layers of security around precious information

Americans’ insatiable desire for rapid communication has often resulted in shortcutting the security necessary to authenticate and verify information. Our abuse of email as the primary method of business communication has made us vulnerable to email phishing or social engineering attacks that exploit a person’s trust. Businesses also need to do more in policing these simple cybersecurity rules for all employees.

Building a secure voting future

Designating elections systems as critical infrastructureis a step in the right direction and by committing to investing in infrastructure, we can start to regain the trust of voters, while lawmakers can ensure that our elections will not be hacked in the future. Since citizens are a part of an information sharing system most likely to be attacked, security must also move as close to the people it serves as possible.

Cybersecurity solutions must then focus on the endpoint – the device in a human’s hand – in order to prevent mistakes and spies from exploiting the weakest link in our security systems, the users of these devices.

Putin and his fellow cyber spies will seek to continue voting disruption campaigns, so we must be especially vigilant in our upcoming 2018 midterm elections. The government must invest time, money and attention in a robust cyber counterintelligence community that hunts attacks and provides warnings to industries before, not after, the breach occurs, while our citizens must be diligent to protect themselves from email phishing schemes.

Together, we can protect our voting system, and most importantly, our democracy.

Original image replaced with Mashable logoOriginal image has been replaced. Credit: Mashable

Eric O’Neill is a national security strategist at Carbon Black’s where he specializes in counterterrorism and national security matters. A former FBI operative, he is nosw a practicing attorney who specializes in cybersecurity vulnerability assessments, counterintelligence and counterterrorism operations, investigations into economic espionage, internal investigations, and security risk assessment consulting.

0.325s , 9946.71875 kb

Copyright © 2025 Powered by 【????? ?????? ?????】How the U.S. can defend its elections from cyberattacks,Public Opinion Flash  

Sitemap

Top 主站蜘蛛池模板: 香蕉影视色多多 | 99无码人妻一区二区三区免费 | 精品无码网址免费不卡 | 四虎永久免费观看在线 | 国产经典三级在线小说 | 亚洲国产日韩欧美高清片a 亚洲国产日韩欧美精品一区二区 | 精品国产乱码久久久 | 东京热无码AⅤ | 2024国产精品一区二区在线 | 精品国产乱码久久久久久蜜桃免费 | 亚洲精品国产A久久久久久 亚洲精品国产不卡在线观看 | 无码人妻久久久一区二区三区免费 | 日本国产一卡二卡三新区2024 | 亚洲综合另类小说色区 | 在线免费自拍视频 | 美女解开胸衣露出奶头的游戏 | 91人妻人人澡人人爽人人精品 | 日本一道高清视频1区 | 欧美久久综合性欧美欧美亚洲综合视频 | 国产夫妇肉麻对白 | 久久九九久久精品久久久久久 | 蜜桃传媒一区二区亚洲AV | 国产一区二区久久A片免费 国产一区二区久久精品 | 日韩人妻激情制服丝袜另类 | 美女毛片一区二区三区四区 | 成人午夜试看120秒体验区 | 视频国产在线观看 | 亚洲日韩日本一区二区 | 爆乳少妇在办公室在线观看 | 成年人免费网站视频 | 国产高清精品国语特黄A片 国产高清精品线久久 | 欧美日韩国产综合网 | 亚洲国产精品一区二区第一页免 | 婷婷综合亚洲 | 成人片AV | 国产欧美日韩综合视频在线观看 | 午夜av无码福利免费看网站 | 精品成人资源在线观看 | 国语对白精品视频在线观看 | 成人区精品一区二区毛片不卡 | 国产精欧美一区二区三区 |