StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security - Assignment Example

Cite this document
Summary
East Dakota is the most competitive state and whoever wins its votes wins the presidency. The state allowed its citizens to vote over the internet and 30 percent of the state’s citizens used the avenue. An…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Network Security
Read Text Preview

Extract of sample "Network Security"

Network security The case involves election of the President of the United s. East Dakota is the most competitive and whoever wins its votes wins the presidency. The state allowed its citizens to vote over the internet and 30 percent of the state’s citizens used the avenue. An online election fraud occurred in the state and an organization tricked citizens to use its site then it used the details to vote for Candidate X. State officials from East Dakota compiled the results and candidate X emerged the winner.

X has been inaugurated and evidence has emerged over the fraud, though it cannot be established if X knew about the scheme. The following is a discussion of responses of two stakeholders to the case. The other presidential candidatesOther presidential candidates should dispute the election of president X because of the involved fraud and Article 2, section one of the 12th amendment support their claim. According to the article, electors in each state shall determine the president and his vice, and communicate their voting results.

This means establishment of a valid electors at the state level. Electors are however elected by majority vote and this relies on validity of the general elections. Knowledge of a presidential contestant regarding election fraud at the public suffrage level is therefore not significant to the issue because the main concern is validity of electors from East Dakota. Evidence however points to electoral malpractices that could have altered composition of the electors and this significance means that the validity concerns applies to the election of the president.

In addition, electors’ votes from East Dakota were fundamental to the election and this means that invalid votes elected the president. Consequently, the other presidential candidates were denied their rights to free and fair elections that they are entitled to and they should seek judicial enforcement of the right through contesting validity of the elections. They should therefore demand for a rerun of the election because the constitution requires simultaneous voting by electors throughout the nation (United States Senate 1).

Citizens of East DakotaLike the other presidential candidates, East Dakota citizens are likely to respond by disputing the presidential elections. Their interest in other candidates, significance of the electoral votes from the state to the presidential elections, and significance of the fraud in the state’s elections are some of the reasons for the potential response. Significance of the state in determining outcome of the presidential elections means that each of the presidential candidates had competitive opportunity for winning the state’s votes and therefore the presidency.

Attempts to initiate fraud also means that President X had few chances of winning the states votes and the fraud altered results that the citizens could have offered. In addition, the state officials’ acknowledgement of possible significance of the fraud to the state’s results is a basis for the citizen’s opinion against the results. The constitutional provision for election of president by electors, who are elected by majority votes, therefore provides for the citizen’s rights that the electoral process undermined.

This is because the technology breach compromised election of the electors and the final votes for the state were not valid. The citizens are therefore likely to demand for fresh state elections and this would mean fresh elections by the Electoral College (United States Senate 1).Works citedUnited States Senate. “Constitution of the United States.” United States Senate. N.p. Web. April 14, 2014. < https://www.senate.gov/civics/constitution_item/constitution.htm>.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Network Security Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1639795-network-security
(Network Security Assignment Example | Topics and Well Written Essays - 500 Words)
Network Security Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1639795-network-security.
“Network Security Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1639795-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security

Data and Network Security

This paper ''Data and Network Security'' tells that The company is known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland.... This point signifies the fact that there are no notable security measures at least for the ground floor.... The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor adds to the threat of a potential security breach....
11 Pages (2750 words) Essay

Rapid Freight Converged Network Security

?Network Security firewalls & VPNs.... hellip; Implementation of the system introduces some security challenges.... The network will also enable ease of monitoring all aspects of the organization while reducing challenges in security (Paul, 2011).... mplementation of the system introduces some security challenges.... Intrusion Detection and Prevention software (IDS and IPS) will further enhance overall security by scanning entire network to identify and report signatures or suspicious traffic arrays (Gregory et al, 2007)....
2 Pages (500 words) Case Study

Network Security Architecture

These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... The security edge in the Centralized approach is the WLAN switch.... In Distributed Architecture, on the other hand, security is extended to the client devices where strong encryption occurs at both the APs and client devices along with authentication....
1 Pages (250 words) Research Paper

Rogue Access Point Network Security Paper

This paper ''Rogue Access Point Network Security Paper'' tells what the main concern was the understanding of ways by which organizations network securities can be exposed to any form of network dangers, and the assessment of the security requirements and approach needed to fully comprehend.... onsequently, the completion of this project is aimed at enabling the student to gain relevant practical knowledge on the aspects of Network Security requirements of an organization that are needed to harden the access points and prevent known network vulnerabilities....
6 Pages (1500 words) Term Paper

Network Security, the Heartbleed Bug

It is a broadly used application of the Transport Layer security (TLS) protocol.... It was labeled Heartbleed because it affects an extension file to the SSL (Secure Sockets Layer) and improper This essay focuses on the increased concern over the effects of the heartbleed bug on the internet security (Codenomicon, 2014).... The SSL/TLS covers privacy and communication security for applications found in the Internet such as the web, instant messaging (IM), email and virtual private networks (VPNs)....
4 Pages (1000 words) Essay

Questions in Network Security

When combined, key distributions and performance are facilitated without any security sacrifices.... They both designed to serve the purpose of ensuring communications security over any computer network.... eb ServersCA Name/ ClassAsymmetric Algorithm/Key lengthSymmetric Algorithm/Key lengthHash AlgorithmYour Rating of security(1-5)FidelityEntrust Certification Authority-L1E2048-bit _RSA-SHA23.... Conclusion security in internet connection and sending of information over the network is every individual's, company's or organization's interests....
1 Pages (250 words) Coursework

The most important threat to network security

With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet… One thing that many people fail to take into consideration is that authentication itself is the most important threat in Network Security and we are just about to find out how in this study.... “Authentication is the process of determining whether someone or something is, Authentication is a Threat in Network Security Number) May 7, (Faculty) Authentication is a Threat in Network Security Network Security has risen to be a matter of prime concern to private network users, organizations and the military as well....
1 Pages (250 words) Assignment

Network Security The Past, Present, and Future

hellip; According to the findings, it can, therefore, be said that the aim of ceasing any undesired intrusion in one's system is encapsulated by one of the most vital areas of computer sciences- Network Security.... These intruders are the reason why Network Security has gained such a prominent name in our modern age.... Marketing plans and revenue reports can serve to be very useful information for competitors in the market, therefore, companies are well aware of Network Security now....
13 Pages (3250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us