Digital threats, from stolen twitter accounts trying to hack election websites. Hackers with access to a voter registration system could cause chaos by tampering with voter data, they could make it more difficult or time-consuming for poll workers to check in voters at polling places. By stealing voter data, hackers could engage in targeted harassment. Hackers have one relatively low-tech tool for knocking campaigns off balance and disrupting voter’s access to reliable election information by forcing websites to crash using automated tools that simulate massive floods of people visiting those sites. The U.S. has many safeguards protecting voting equipment, Major tech companies like Google and Cloudflare offer free protection against these attacks to election offices and political campaigns, but many websites remain unprotected. You can try to prevent this by using security software, but nothing is guaranteed.
Who published the content? Eric Geller
Where was it published? Politico
When was it published? 11/07/2020
The truthfulness and integrity of the facts: The article is factual and honest.
How is it written and presented? The article is well written, it has some ads and it's informative.
Links and Citations: There are several links throughout the article pertaining to the article.
In 2019 Jessica Roy became a victim of identity theft. In a bar in San Francisco the day after Thanksgiving 2018. When she went to close her tab, she discovered her wallet was gone. By the time she got her bank on the phone the next morning, her debit card had been used at a gas station for $48.15 and with a square card reader for $30. She disputed both transactions and canceled all her cards. She went to a San Francisco police station to report the stolen wallet. When she got home to L.A., she had to get a new driver’s license, had to update her autopay bills and had to buy a new wallet. Jessica thought that was the end of it. To prevent a situation like this you must be more cautious and aware of your surroundings.
Who published the content? Jessica Roy
Where was it published? Los Angeles Times
When was it published? 10/26/2022
The truthfulness and integrity of the facts: This article is informative.
How is it written and presented? The article is very detailed and has some ads.
Links and Citations: There are several links throughout the article pertaining to the article.
For the final part of the assignment, I had to complete the CCBC cybersecurity training and present my certificate here. one thing I learned was the difference between phishing, malware, and ransomware.