Security 101

I was having a conversation the other night about computer security and what you’d need to do to secure an election. It got me to thinking the other way around. If I deliberately wanted to make sure that third parties could access my election infrastructure locally or remotely and not be noticed, how would I relax security in order to grant them access and hide their presence?

Security 101 Read More