2018 ELECTION SECURITY PLAYBOOK
disrupt our democracy. We must take strong actions to prevent interference including misinformation, phishing expeditions, and any other forms of meddling, mischief, and disruptions from Foreign States. Throughout this cybersecurity playbook, the threat from Foreign States is incorporated into the planning process. Examples of Threats We have identified examples of potential threats and exploits specific to elections, and later in this report, we will describe some mitigation strategies. Listed below are examples of identified threats:
• Computer virus
• Malware
• Breach of confidential information
• Denial of access
• Bomb threats and physical threats
• Phishing attack
• Hacking
• Social engineering
• Tampering of voting equipment
• Power outage
• Disgruntled poll worker or employee
• Fake information, including from social media
• Physical access to voting machines
• Lost access to voter database
• Voter registration tampering
• Vendor related threats
ORANGE COUNTY REGISTRAR OF VOTERS
9
Made with FlippingBook Digital Proposal Creator