Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Voting (2)
- Administration (1)
- America (1)
- American (1)
- Conviction (1)
-
- Criminal (1)
- Critical infrastructure (1)
- Cyber (1)
- Cyber security (1)
- DHS (1)
- Democratic (1)
- Department (1)
- Election (1)
- Election infrastructure (1)
- Federal (1)
- Felon (1)
- Felony (1)
- Foreign (1)
- Government (1)
- Governor (1)
- HSA (1)
- Hacker (1)
- Homeland (1)
- Howell (1)
- Industry (1)
- Infrastructure (1)
- Justice (1)
- Legitimacy (1)
- McAuliffe (1)
- National (1)
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Law
Howell V. Mcauliffe, L. Michael Berman
Howell V. Mcauliffe, L. Michael Berman
University of Richmond Law Review
No abstract provided.
Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As "Critical Infrastructure" Under The United States Code, Allaire M. Monticollo
Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As "Critical Infrastructure" Under The United States Code, Allaire M. Monticollo
University of Richmond Law Review
No abstract provided.
Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo
Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo
Law Student Publications
In just the past five years, the United States has suffered numerous hacks into important entities and institutions across the country by ill-intentioned actors. Private companies and government agencies alike have felt the negative impacts of security breaches by hackers infiltrating proprietary and protected systems. Even the United States political landscape has proven vulnerable to bad actors in the realm of cyber security. Furthermore, analysts have attributed some of the most recent highly publicized hacks to state-sponsored groups. As cyber security threats and opportunities for foreign hackers to infiltrate critical systems become more prevalent, it is natural to wonder where …