• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Comments for “Feds Warn States to Batten Down Hatches Following Election System Attacks”

September 4, 2016 by Wade Mackey 2 Comments

This is an area where internal threats may be even greater.  Admins of these systems have the ability to “adjust” vote counts.  This means processes will need to be put in place to ensure this does not happen or is logged and reported.

Wade Mackey

 

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Loi Van Tran says

    September 4, 2016 at 6:09 pm

    To learn that our voting system is vulnerable to something that is easily preventable as SQL injection really makes you cringe a little bit. I am no expert in coding, but have taken some classes pertaining to database security. Some of the things that I’ve learned was how to prevent SQL injections by using prepare statements and other techniques to remove “injected” code. I’m probably talking in simpler terms and SQL injections may be more sophisticated but considering that it’s a known threat, I believe that more proactive measures could’ve been implemented to protect something as important as voting information.

    Log in to Reply
  2. Vaibhav Shukla says

    September 4, 2016 at 11:14 pm

    Regarding the election system hack as you mentioned the threat is more probably the internal threat than the external threat.
    There has to be strict monitoring mechanism pertaining to election system admins.
    The admin credentials will be limited to certain number of people so there has to be check using a bio-metric system for the admin owners so that there is no unwanted sharing or monitoring of admin data.
    The election system software available to the admin to work should be integrated with data logging mechanism so that every request sent to servers can be monitored and checked to find if any adjustment has been made to vote counts.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in