Cyber Security

Secure the Data, Not the Device: How Decentralized File Storage Creates Resilience Against the Risk of Ransomware Attacks

DSA ADS Course, 2022

Data Security, Data Engineering, Cyber Security

Discuss data security and data engineering applying decentralized storage strategy. Discuss security risks and how to mitigate without unreasonable performance disruption. Weigh trade-offs in several operational scenarios. Discuss potential legal exposure and both civil and criminal liability in different scenarios.

Secure the Data, Not the Device: How Decentralized File Storage Creates Resilience Against the Risk of Ransomware Attacks

Ballot-Marking Devices (BMDs) Cannot Assure the Will of the Voters

January, 2020

Abstract

Computers, including all modern voting systems, can be hacked and misprogrammed. The scale and complexity of U.S. elections may require the use of computers to count ballots, but election integrity requires a paper-ballot voting system in which, regardless of how they are initially counted, ballots can be re- counted by hand to check whether election outcomes have been altered by buggy or hacked software. Furthermore, secure voting systems must be able to recover from any errors that might have occurred.